| Literature DB >> 34660167 |
Aiman Jan1, Shabir A Parah1, Muzamil Hussan1, Bilal A Malik2.
Abstract
Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provides double-layer protection from the potential eavesdropper. Several steganography and cryptographic approaches have been developed so far to ensure data safety during transmission over a network. The purpose of this work is to succinctly review recent progress in the area of information security utilizing combination of cryptography and steganography (crypto-stego) methods for ensuring double layer security for covert communication. The paper highlights the pros and cons of the existing image steganography techniques and crypto-stego methods. Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems. © IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature 2021.Entities:
Keywords: Attacks; Cryptography; Imperceptivity; Security; Steganography
Year: 2021 PMID: 34660167 PMCID: PMC8512592 DOI: 10.1007/s12553-021-00602-1
Source DB: PubMed Journal: Health Technol (Berl) ISSN: 2190-7196
Fig. 1Different Information Protecting Mechanisms
Fig. 2General Steganography approach together with Cryptography (Crypto-Stego)
Pros and cons of different special domain based image steganography techniques
| AbdelRaouf [ | • Good image quality • Good embedding capacity | • Less secure |
| Hussain et al. [ | • Considerable imperceptivity • Good embedding capacity | • Less secure |
| Sahu and Swain [ | • Enough payload • Better image imperceptivity | • Less secure • Analyzed only on grayscale images • Processing time is more |
| Hussain et al. [ | • Increases embedding capacity • Attains considerable visual imperceptivity | • Less secure |
| Malik et al. [ | • Maintains image quality • Good payload | • Less secure |
| Kumar et al. [ | • Considerable payload | • Less secure • Low image quality |
| Chakraborty and Jalal [ | • Good payload • Better image quality | • Less embedded data security |
| Lin et al. [ | • Considerable image quality | • Less payload • Less secure |
| Parah et al. [ | • Considerable image quality • Better payload | • Less secure • Takes more time for the embedding process |
| Li et al. [ | • Enhanced payload than compared methods • Good visual image quality | • Tested only on grayscale images • Less secure |
| Saha et al. [ | • Increased payload • Reduces image distortion | • Less secure |
| Shen et al. [ | • Good embedded efficiency • Considerable image quality | • Less secure • Analyzed only on grayscale images • Computationally inefficient |
| Bairagi et al. [ | • Secure than existing steganography approaches | • Less payload |
| Rim et al. [ | • Good security • Good imperceptibility | • Capacity is less |
| Hassan and Gutub [ | • Huge payload | • Poor image quality • Less secure • Takes more time for embedding the data |
Pros and cons of different edge based image steganography techniques
| Atta and Ghanbari [ | • Good imperceptivity • Good amount of payload | • Less secure |
| Dhargupta et al. [ | • Good embedding capacity | • More distorted image • Less secure |
| Ahmadian and Amirmazlaghani [ | • Improved image quality | • Less embedding space |
| Kich et al. [ | • Robust • Imperceptible | • Less secure • Low payload |
| He et al. [ | • Good payload with considerable visual image quality | • Less secure |
| Gaurav and Ghanekar [ | • Good image quality • Better payload | • Less secure |
| Prasad and Pal [ | • Good payload • Considerable image quality | • Tested only on grayscale images • Less secure |
| Mukherjee and Sanyal [ | • Good image quality • Good hidden data capacity | • Less secure |
| Kadhim et al. [ | • Good embedding capacity • Good image quality | • Less secure |
| Ghosal et al. [ | • Increased payload • Increased image quality | • Less secure |
| Ghosal et al. [ | • Improved payload • Less image distortion | • Less secure |
| Banik et al. [ | • Good image quality • Good payload | • Less secure • Implemented only on grayscale images |
| Wang et al. [ | • Good payload • Better image quality | • Less secure |
| Tripathy and Srivastava [ | • Can hide the vast amount of data into an image • Good visual image quality | • Less secure |
| Tuncer and Sonmez [ | • Good capacity • Good visual quality | • Less secure |
Pros and cons of different frequency domain based image steganography techniques
| Abdel-Aziz et al. [ | • Good embedding space • Good security • Better image quality | • Complex • Tested only on grayscale images |
| Yao et al. [ | • Considerable embedding capacity • Good visual image quality | • Less secure • Complex |
| Liu and Chang [ | • Good image quality • Considerable payload | • Less secure • Complex |
| Attaby et al. [ | • Reduces image distortion • Improves image embedding space | • Less secure • Complex |
| Mohamed et al. [ | • High embedding capacity • Considerable image quality • Secure | • Complex |
| Rabie et al. [ | • Better payload | • Poor image visual quality • Complex • Less secure for embedded data |
| Saidi et al. [ | • Good payload • Secure | • Less imperceptibility • Complex |
| Nipanikar et al. [ | • Good image imperceptivity • Good payload | • Less secure • Complex |
| Nevriyanto et al. [ | • Good image quality | • Less payload • Complex • Less secure |
| Miri and Faez [ | • Good image quality • Considerable embedding space | • Less secure • Complex |
| Kalita et al. [ | • Good visual quality of an image • Considerable embedding capacity | • Less secure • Complex |
| Ghosal et al. [ | • Good payload • Good image quality | • Less secure • Complex • Takes good time for completing embedding and extraction process |
| Ma et al. [ | • Large data hiding capacity • Good image imperceptivity | • Less secure • Complex |
| Murugan and Subramaniyam [ | • Provides good payload while preserving image quality • Secure than the existing techniques | • Complex |
Pros and cons of different dual security image steganography techniques
| Maji et al. [ | • Good embedding space • Good image quality • Secure | • Tested only on grayscale images |
| Sharif et al. [ | • Secure against statistical attacks • Better payload • Considerable image quality | • Complex |
| Gambhir and Mandal [ | • Secure • Better image quality | • Less embedding capacity |
| Prasad and Pal [ | • Secure • Considerable image quality | • Analyzed on grayscale images only |
| Mohammad et al. [ | • Secure for visual content authenticity in social networks | • Complex • Less payload |
| Alotaibi et al. [ | • Considerable amount of payload | • Low visual quality of an image |
| Mathivanan and Balaji [ | • Secure | • Less embedding space |
| Abdelwahab et al. [ | • Good payload • Considerable image quality | • Complex |
| Parah et al. [ | • Secure • Authentic • Good image quality • Less processing time | • Analyzed only on greyscale images thus has limited capacity |
| Parah et al. [ | • Good capacity • Good image quality • Secure • Low embedding time | • Complex • More extraction processing time |
| Delmi et al. [ | • Secure • Good image imperceptivity | • Low payload |
| Sharma et al. [ | • Better image quality • Considerable payload | • Complex |
| Kaushik and Sheokand [ | • Secure • Better image quality | • Less embedding capacity |
| Panday [ | • Secure • Good image quality | • Complex • Low embedding space |
| Elhoseny et al. [ | • Good image quality • Secure | • Low payload • Complex |
| Duan et al. [ | • Analyzed on both grayscale and color images • Secure • Better capacity • Considerable image quality | • Complex |
| Subhedar and Mankar [ | • Secure • Good image quality | • Low payload • Implemented only on grayscale images • Complex |
| Eyssa et al. [ | • Secure • Considerable payload and image quality | • Complex |
| Kaur and Singh [ | • Good payload • Secure | • Applied only on grayscale images • Complex • Poor image quality |
| Hureib and Gutub [ | • Good embedding space • Better image quality | • Not tested for statistical attacks to claim better security |
| Hureib and Gutub [ | • Secure • Better visual quality of an image | • Low payload |
| Samkari and Gutub [ | • Good image quality • Secure | • Complex |
| Denis and Madhubala [ | • Good image quality • Secure | • Low embedding space • Complex |
| Manikandan et al. [ | • Considerable image quality | • Low hiding capacity |
| Ogundokum et al. [ | • Good visual quality of an image • Secure | • Low payload |
| Prasanalakshmi et al. [ | • Considerable payload • Good image quality | • Complex |
Different parameter comparison of existing image steganography techniques
| AbdelRaouf [ | 2.08 | 84.2420 | 43.95 | - | - | 0.8320 |
| Hussain et al. [ | 4.05 | - | 34.05 | - | - | - |
| Sahu and Swain [ | 6.00 | - | 47.64 | - | - | 0.9949 |
| Hussain et al. [ | 3.00 | - | 38.84 | - | - | - |
| Malik et al. [ | 1.51 | - | 49.95 | - | - | - |
| Kumar et al. [ | 0.77 | - | 30.79 | - | - | - |
| Chakraborty and Jalal [ | 3.36 | - | 56.91 | - | - | - |
| Lin et al. [ | 0.15 | - | 40.01 | - | - | - |
| Parah et al. [ | 2.25 | - | 39.25 | 1.0000 | 0.0147 | 0.9691 |
| Li et al. [ | 3.16 | 7.0713 | 39.63 | - | - | 0.9908 |
| Saha et al. [ | 3.00 | - | 40.82 | - | - | - |
| Shen et al. [ | 1.60 | - | 39.62 | - | - | - |
| Bairagi et al. [ | 1.24 | - | 54.77 | 0.9999 | - | - |
| Hassan and Gutub [ | 1.82 | - | 26.63 | - | - | - |
| Atta and Ghanbari [ | 3.37 | - | 49.87 | - | - | 0.9978 |
| Dhargupta et al. [ | 2.39 | - | 37.02 | - | - | - |
| Ahmadian and Amirmazlaghani [ | 0.25 | - | 49.74 | - | - | - |
| Kich et al. [ | 0.30 | - | 52.53 | - | - | - |
| He et al. [ | 2.25 | - | 37.38 | - | - | - |
| Gaurav and Ghanekar [ | 1.23 | 3.4049 | 42.80 | - | - | 0.9980 |
| Prasad and Pal [ | 3.17 | - | 35.92 | 1.0000 | - | - |
| Mukherjee and Sanyal [ | 2.00 | 1.3800 | 46.78 | 0.9995 | - | - |
| Kadhim et al. [ | 5.40 | - | 47.08 | 0.9750 | - | 0.9998 |
| Ghosal et al. [ | 2.08 | - | 45.59 | - | - | - |
| Ghosal et al. [ | 1.65 | 1.5300 | 46.39 | - | - | 0.9965 |
| Banik et al. [ | 2.00 | - | 42.34 | - | - | - |
| Tuncer and Sonmez [ | 3.12 | - | 39.28 | - | - | - |
| Abdel-Aziz et al. [ | 2.50 | 0.0005 | 77.24 | 0.9577 | - | 0.9262 |
| Yao et al. [ | 0.15 | - | 56.66 | - | - | - |
| Mohamed et al. [ | 21.83 | - | 37.01 | - | - | 0.9998 |
| Rabie et al. [ | 20.81 | - | 31.79 | - | - | 0.9757 |
| Saidi et al. [ | 1.00 | - | 30.13 | 0.9800 | - | 0.8700 |
| Miri and Faez [ | 0.26 | 0.2788 | 53.68 | - | - | - |
| Kalita et al. [ | 0.50 | - | 44.06 | 0.9999 | - | - |
| Ghosal et al. [ | 1.00 | - | 49.38 | - | - | - |
| Ma et al. [ | 0.35 | - | 51.24 | - | - | 0.9984 |
| Murugan and Subramaniyam [ | 1.00 | 0.9076 | 49.56 | - | - | - |
| Maji et al. [ | 0.90 | 0.4469 | 51.62 | 0.9994 | - | 0.9976 |
| Sharif et al. [ | 12.00 | - | 38.75 | - | - | - |
| Prasad and Pal [ | 2.29 | - | 38.79 | - | - | - |
| Alotaibi et al. [ | 2.00 | - | 39.91 | - | - | - |
| Abdelwahab et al. [ | 1.58 | 0.1600 | 43.45 | - | - | - |
| Parah et al. [ | 0.55 | - | 53.12 | 0.9994 | 0.0019 | - |
| Parah et al. [ | 2.25 | - | 41.98 | 0.9693 | ||
| Delmi et al. [ | 0.10 | - | 45.30 | - | - | - |
| Kaushik and Sheokand [ | 0.01 | 0.0100 | 68.13 | - | - | - |
| Elhoseny et al. [ | 0.01 | 0.1288 | 57.02 | 1.0000 | 1.0000 | |
| Duan et al. [ | 23.45 | - | 40.57 | - | - | 0.9602 |
| Subhedar and Mankar [ | 0.25 | - | 50.08 | 0.9999 | - | 0.9996 |
| Eyssa et al. [ | 0.75 | - | 40.46 | - | - | - |
| Kaur and Singh [ | 0.50 | - | 34.86 | - | - | - |
| Hureib and Gutub [ | 24.00 | - | 70.94 | - | - | - |
| Hureib and Gutub [ | 1.00 | - | 74.61 | - | - | - |
| Manikandan et al. [ | 1.00 | - | 48.94 | - | - | 0.9580 |
Graph 1PSNR value of existing method for 0–2 bpp embedding capacity
Graph 2PSNR value of exisitng method for 2–6 bpp embedding capacity
Graph 3PSNR value of exisitng methods for 12–24 bpp embedding capacity
Embedding and extraction of some image steganography techniques
| Sahu and Swain [ | 9.0000 | 11.0000 |
| Parah et al. [ | 8.2633 | - |
| Shen et al. [ | 6.7300 | - |
| Hassan and Gutub [ | 3.7870 | - |
| Ghosal et al. [ | 1.5400 | 1.4100 |
| Parah et al. [ | 0.9804 | 0.0547 |
| Parah et al. [ | 0.3481 | 2.3270 |