Digital Image Steganography and Steganalysis: A Comprehensive Review of Evolution of Advanced Techniques

 

Digital Image Steganography and Steganalysis: A Comprehensive Review of Evolution of Advanced Techniques

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-11
Year of Publication : 2023
Author : Sunil Kumar, Sudeshna Chakraborty
DOI : 10.14445/22315381/IJETT-V71I11P229

How to Cite?

Sunil Kumar, Sudeshna Chakraborty, "Digital Image Steganography and Steganalysis: A Comprehensive Review of Evolution of Advanced Techniques," International Journal of Engineering Trends and Technology, vol. 71, no. 11, pp. 276-285, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I11P229

Abstract
Steganalysis is the process of detecting the presence of hidden information, such as a message or data, within another message or data. The goal of steganalysis is to identify the presence and type of steganography technique used to hide the information, which can be important for various applications, including law enforcement, intelligence gathering, and cyber security. Therefore, steganography techniques can thought of as hiding information in various types of media, such as images, videos, audio files, and even text data. While steganography techniques for media-based data, such as images and videos, have gained more attention in recent years, steganography for text data has been used for much longer. In fact, the concept of text steganography can be traced back to ancient Greece, where messages were hidden within wax tablets by writing them in between the lines of text. Text steganalysis techniques typically involve analyzing the statistical properties of the text, such as word frequency or character frequency distributions. Other techniques include analyzing the structure and syntax of the text, as well as performing linguistic analysis to identify patterns that may indicate the presence of hidden information. In this study, we shall perform a systematic study of the evolvement of traditional as well as contemporary techniques. The study will also reflect how generative artificial intelligence has impacted the quality of digital image steganography.

Keywords
Digital Image Steganalysis, Steganography, Encryption.

References
[1] Hsiang-Kuang Pan, Yu-Yuan Chen, and Yu-Chee Tseng, “A Secure Data Hiding Scheme for Two-Color Images,” Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications, pp. 750-755, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Derrick Grover, “Data Watermarking: Steganography and Water-Marking of Digital Data,” Computer Law and Security Review, vol. 17, no. 2, pp. 101-104, 2001.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Johnson, N.F., Duric, Z., Jajodia, S. (2001). Exploring Steganography. In: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Advances in Information Security, vol 1. Springer, Boston, MA. [CrossRef] [Publisher Link
[4] Yeuan-Kuen Lee, and Ling-Hwei Chen, “Object-Based Image Steganography Using Affine Transformation,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 6, pp. 681-696, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[5] S.K. Pal, and CE Veni Madhavan, “Investigating Steganographic Communications,” IETE Technical Review, vol. 19, no. 4, pp. 207-212, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Jessica Fridrich, and Miroslav Goljan, “Practical Steganalysis of Digital Images: State of the Art,” Proceedings, Security and Watermarking of Multimedia Contents IV, vol. 4675, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[7] K. Bailey, Joan Condell, and K. Curran, “Steganography in Images: An Overview,” Irish Machine Vision and Image Processing Conference (IMVIP2003), 2003.
[Google Scholar] [Publisher Link]
[8] W.A. Wan Adnan et al., “A Review of Image Watermarking,” Proceedings. Student Conference on Research and Development, SCORED 2003, pp. 381–384, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Rajarathnam Chandramouli, Mehdi Kharrazi, and Nasir Memon, “Image Steganography and Steganalysis: Concepts and Practice,” Second International Workshop on Digital Watermarking, IWDW 2003, pp. 35-49, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Mei-Yi Wu, Yu-Kun Ho, and Jia-Hong Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters, vol. 25, no. 3, pp. 301-309, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Zoran Duric, Michael Jacobs, and Sushil Jajodia, “6 - Information Hiding: Steganography and Steganalysis,” Handbook of Statistics, vol. 24, pp. 171-187, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[12] A. Martin, G. Sapiro, and G. Seroussi, “Is Image Steganography Natural?,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2040-2050, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[13] A.I. Hashad, A.S. Madani, and AEMA Wahdan, “A Robust Steganography Technique Using Discrete Cosine Transform Insertion,” 2005 International Conference on Information and Communication Technology, pp. 255-264, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon, “Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography,” Transactions on Data Hiding and Multimedia Security, pp. 123-137, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[15] S. Torres-Maya, M. Nakano-Miyatake, and H. Perez-Meana, “An Image Steganography Systems Based on BPCS and IWT,” 16th International Conference on Electronics, Communications and Computers (CONIELECOMP’06), pp. 51-51, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ran-Zan Wang, and Yeh-Shun Chen, “High-Payload Image Steganography Using Two-Way Block Matching,” IEEE Signal Processing Letters, vol. 13, no. 3, pp. 161-164, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Inas Jawad Kadhim et al., “Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research,” Neurocomputing, vol. 335, pp. 299–326, 2019. [
[CrossRef] [Google Scholar] [Publisher Link]
[18] Mohammad Tanvir Parvez, and Adnan Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits Image Steganography,” IEEE AsiaPacific Services Computing Conference, pp. 1322-1327, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon, “Image Steganography and Steganalysis: Concepts and Practice,” Mathematics and Computation in Imaging Science and Information Processing, pp. 177-207, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Chin-Chen Chang, Yi-Pei Hsieh, and Chia-Hsuan Lin, “Sharing Secrets in Stego Images with Authentication,” Pattern Recognition, vol. 41, no. 10, pp. 3130–3137, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Zunera Jalil, and Anwar M. Mirza, “A Review of Digital Watermarking Techniques for Text Documents,” 2009 International Conference on Information and Multimedia Technology, pp. 230-234, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[22] C.C. Wu, M.S. Hwang, and S.J. Kao, “A New Approach to the Secret Image Sharing with Steganography and Authentication,” The Imaging Science Journal, vol. 57, no. 3, pp. 140–151, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Abbas Cheddad et al., “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90, no. 3, pp. 727-752, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Rina Mishra, and Praveen Bhanodiya, “A Review on Steganography and Cryptography,” 2015 International Conference on Advances in Computer Engineering and Applications, pp. 119-122, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Neha Sharma, and Usha Batra, “A Review on Spatial Domain Technique Based on Image Steganography,” 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 24-27, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[26] N. Revathy, and G. Vijitha, “A Secure Image Steganography Technique to Hide Multimedia Files in RGB Images,” SSRG International Journal of Electronics and Communication Engineering, vol. 5, no. 6, pp. 14-18, 2018.
[CrossRef] [Publisher Link]
[27] Jia Liu et al., “Recent Advances of Image Steganography with Generative Adversarial Networks,” IEEE Access, vol. 8, pp. 60575-60597, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Jeanne Georges, and Dalia A. Magdi, “Using Artificial Intelligence Approaches for Image Steganography: A Review,” Internet of ThingsApplications and Future, pp. 239–247, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Arome Junior Gabriel, Adebayo Olusola Adetunmbi, and Preye Obaila, “A Two-Layer Image-Steganography System for Covert Communication Over Enterprise Network,” International Conference on Computational Science and Its Applications - ICCSA 2020, pp. 459-470, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Weixuan Tang et al., “CNN- Based Adversarial Embedding for Image Steganography,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2074–2087, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[31] KV Sriram, and R.H. Havaldar, “Convolutional Neural Network Based Data Security in Image Steganography,” SSRG International Journal of Electrical and Electronics Engineering, vol. 10, no. 7, pp. 102-109, 2023.
[CrossRef] [Publisher Link]