A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
Multimedia Systems and Applications
Computer
BPCS steganography using EZW lossy compressed images
Pattern Recognition Letters
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Watermarking in secure image retrieval
Pattern Recognition Letters
Secure Transmission of Medical Records Using High Capacity Steganography
CBMS '04 Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems
IBM Systems Journal
Adaptive steganography based on dithering
Proceedings of the 2004 workshop on Multimedia and security
A New Approach to Persian/Arabic Text Steganography
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
Computer
An evaluation of image based steganography methods
Multimedia Tools and Applications
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
A steganographic method based upon JPEG and particle swarm optimization algorithm
Information Sciences: an International Journal
A new steganographic method for color and grayscale image hiding
Computer Vision and Image Understanding
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Impulsive noise suppression from images with the noise exclusive filter
EURASIP Journal on Applied Signal Processing
Protection of Mammograms Using Blind Steganography and Watermarking
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images
ICISIP '05 Proceedings of the 2005 3rd International Conference on Intelligent Sensing and Information Processing
Information Hiding Based on Image Morphing
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Proceedings of the 10th ACM workshop on Multimedia and security
PM1 steganography in JPEG images using genetic algorithm
Soft Computing - A Fusion of Foundations, Methodologies and Applications - Special Issue on Bio-Inspired Information Hiding; Guest editors: Jeng-Shyang Pan, Ajith Abraham
Data hiding method using image interpolation
Computer Standards & Interfaces
Invariant Image Watermarking Based on Local Feature Regions
CW '08 Proceedings of the 2008 International Conference on Cyberworlds
A High Capacity 3D Steganography Algorithm
IEEE Transactions on Visualization and Computer Graphics
Lossless Data Hiding Scheme Based on Adjacent Pixel Difference
ICCET '09 Proceedings of the 2009 International Conference on Computer Engineering and Technology - Volume 01
A Novel Content-based Information Hiding Scheme
ICCET '09 Proceedings of the 2009 International Conference on Computer Engineering and Technology - Volume 01
Steganalysis of halftone image using inverse halftoning
Signal Processing
A local Tchebichef moments-based robust image watermarking
Signal Processing
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Exploiting preserved statistics for steganalysis
IH'04 Proceedings of the 6th international conference on Information Hiding
An adaptive steganography for index-based images using codeword grouping
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
New image steganographic methods using run-length approach
Information Sciences: an International Journal
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Robust watermarking of facial images based on salient geometricpattern matching
IEEE Transactions on Multimedia
A steganographic scheme for secure communications based on the chaos and euler Theorem
IEEE Transactions on Multimedia
Genetic algorithm based methodology for breaking the steganalytic systems
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Steganography: Steganography approaches, options, and implications
Network Security
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Region-based image watermarking
IEEE Transactions on Image Processing
Data hiding watermarking for halftone images
IEEE Transactions on Image Processing
Is image steganography natural?
IEEE Transactions on Image Processing
An improved section-wise exploiting modification direction method
Signal Processing
Concurrent covert communication channels
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Journal of Visual Communication and Image Representation
How quantization based schemes can be used in image steganographic context
Image Communication
Journal of Systems and Software
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Journal of Visual Communication and Image Representation
How to Transform and Filter Images Using Iterated Function Systems
SIAM Journal on Imaging Sciences
Robust color image watermarking using LS-SVM correction
ISNN'12 Proceedings of the 9th international conference on Advances in Neural Networks - Volume Part II
Steganographic manipulations with elliptic curve cryptography
International Journal of Electronic Security and Digital Forensics
Human visual system based data embedding method using quadtree partitioning
Image Communication
Color local complexity estimation based steganographic (CLCES) method
Expert Systems with Applications: An International Journal
A robust blind color image watermarking in quaternion Fourier transform domain
Journal of Systems and Software
Journal of Systems and Software
A Comparative Survey on Cryptology-Based Methodologies
International Journal of Information Security and Privacy
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking
International Journal of Information Security and Privacy
Information Hiding Using Ant Colony Optimization Algorithm
International Journal of Technology Diffusion
A novel approach to digital watermarking, exploiting colour spaces
Signal Processing
Using PSO in a spatial domain based image hiding scheme with distortion tolerance
Computers and Electrical Engineering
Region of interest signalling for encrypted JPEG images
Proceedings of the first ACM workshop on Information hiding and multimedia security
Steganalysis of a PVD-based content adaptive image steganography
Signal Processing
A robust digital watermarking algorithm in undecimated discrete wavelet transform domain
Computers and Electrical Engineering
Steganalysis of F5-like steganography based on selection of joint distribution features
Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service
Cryptagram: photo privacy for online social media
Proceedings of the first ACM conference on Online social networks
Engineering Applications of Artificial Intelligence
Block-based image steganalysis: Algorithm and performance evaluation
Journal of Visual Communication and Image Representation
A new data hiding method via revision history records on collaborative writing platforms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Communications of the ACM
Wavelet-transform steganography: algorithm and hardware implementation
International Journal of Electronic Security and Digital Forensics
Self-synchronising image steganography algorithms based on error-correcting codes
International Journal of Electronic Security and Digital Forensics
A novel reversible image authentication scheme for digital images
Signal Processing
Interpolation of steganographic schemes
Signal Processing
Data hiding in scrambled images: A new double layer security data hiding technique
Computers and Electrical Engineering
Bayesian Segmentation Based Local Geometrically Invariant Image Watermarking
Fundamenta Informaticae
Hi-index | 0.10 |
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other science it can be used for ill intentions. It has been propelled to the forefront of current security techniques by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government and through intellectual pursuit. Steganography's ultimate objectives, which are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism. Steganalysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed.