Improved Approaches and Various study on image Steganography

Swati Bhargava, Prachi Goyal


Steganography is the sciences that include impart secretive information in an appropriate interactive media bearer, for eg, picture, sound, and video records. It comes beneath the assumption so as to if feature is visible, point of assault is obvious, thus aim here is for all time to hide the extremely existence of embedded data. Steganography has a variety of use applications. Though, like any other science it is able to use for the ill intentions. It has been impelled to front of present security strategies by momentous improvement in computational power, increment in wellbeing mindfulness by, e.g., individuals, groups, agency, and government and all the way through intellectual detection. A wide range of transporter record organizations can be utilized, yet advanced pictures are the most famous in view of their recurrence on the web. This paper presents two new procedures where in cryptography and steganography are united to scramble the data and notwithstanding cover the data in another medium through IP. This Report securing the picture by encryption is finished by DES calculation utilizing the key picture. The scrambled picture can be covering up in another picture by utilizing RSA procedures, with the goal that the mystery’s exceptionally presence is hidden. The decoding should be possible by a similar key picture utilizing DES calculation. 


Image steganography, DES, RSA, Techniques, Modal, Application

Full Text:



Ashadeep Kaur , Rakesh Kumar, Kamaljeet Kainth, “Review Paper on Image Steganography” International Journal of Advanced Research in Computer Science and Software Engineering. Volume 6, Issue 6, June

ISSN: 2277 128X.

Mehdi Hussain and Mureed Hussain, “ A Survey of Image Steganography Techniques”. International Journal of Advanced Science and Technology 2013.

Hemang A . Prajapati1, Dr. Nehal G. Chitaliya,” Secured and Robust Dual Image Steganography: A Survey”, International Journal of Innovative Research in Computer and Communication Engineering 2015. 4. Kedar Nath Choudry, Aakash Wanjari, “A Survey Paper on Video Steganography”, (IJCSIT) , 2015.

Handel, T. & Sandford, M., Hiding data in the OSI network model, Proceedings of the 1st International Workshop on Information Hiding, June (1996).

N. Johnson and S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer, pp. 26-34, February (1998).

E Lin, E Delp, A Review of Data Hiding in Digital Images. Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference (PICS’99), Savannah, Georgia, April 25-28, (1999).

Md. Khalid Imam Rahmani, Kamiya Arora2 , Naina Pal, “A Crypto-Steganography: A Survey”. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 7, 2014.

Hemang A. Prajapati , Dr. Nehal G. Chitaliya, “Secured and Robust Dual Image Steganography: A Survey”. IJIRCCE,Volume 3, 2015.

Hui Tian, Jie Qin, Yongfeng Huang, Yonghong Chen, Tian Wang, Jin Liu, Yiqiao Cai “Optimal matrix embedding for Voice-over-IP steganography” College of Computer Science and Technology, National Huaqiao University, ELSEVIER, 2015.

Himani Trivedi and Arpit Rana, “A Study Paper on Video Based Steganography” , IJARIIT © 2017 All Rights Reserved.

Ammad UI Islam et al, “An Improved Image Steganography Technique based on MSB using Bit Differencing”, 978-1-5090-2000-3/16/$31.00 IEEE ©2016.

Ramadhan J. Mstafa1 ,Khaled M. Elleithy1 and Eman Abdelfattah2, “A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC” , 2169-3536 (c) 2016 IEEE. 14. Alavi Kunhu, Nisi K, Sadeena Sabnam, Majida A, Saeed AL-Mansoori, “Index Mapping based Hybrid DWT-DCT Watermarking Technique for Copyright Protection of Videos Files” , 978-1-5090-4556-3/16/$31.00 ©2016 IEEE.

Ch.Sathi Raju, D.V.Rama Koti Reddy, “On Compression Characteristics of White Band and Narrow Band Images Using Hybrid DCT and DWT” , 978-1- 4788-7225 -8/15/$31.00©2015 IEEE.

N.V.Lalitha, P.Vara Prasad, S.UmaMaheshwar Rao, S.UmaMaheshwar Rao , “Performance Analysis of DCT and DWT Audio Watermarking based on SVD” ,978-1-5090-1277-0/16/$31.00 ©2016 IEEE.

Ammad Ul Islam1 , Faiza Khalid2 , Mohsin Shah2 , Zakir Khan2 , Toqeer Mahmood3 , Adnan Khan2 , Usman Ali2 , Muhammad Naeem4, “An Improved Image Steganography Technique based on MSB using Bit Differencing” , 978-1-5090-2000-3/16/$31.00 ©2016 IEEE.

Vidhya P.M,Varghese Paulb, “A Method for Text Steganography Using Malayalam Text” ,Volume 28, ICICT 2014.

Milia Habib, Bassem Bakhache, Dalia Battikh, Safwan El Assad “Enhancement using chaos of a Steganography method in DCT domain”, IEEE, 2015.

Yugeshwari Kakde, Priyanka Gonnade, Prashant Dahiwale, “Audio-Video steganography” IEEE, 2015.

Kamaldeep Joshi, Rajkumar Yadav, “A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication” IEEE, 2015.

Sayantari Ghosh, Saumik Bhattacharya Amity University, Kolkata W.B., India “Hilbert Curve Based Steganographic Scheme for Large Data Hiding”, IEEE, 2015.

Avinash Tyagi, Ratnakirti Roy, Suvamoy Changder, “High Capacity Image Steganography based on Pixel Value Differencing and Pixel Value Sum” IEEE, 2015.

Soon-Nyean Cheong, Huo-Chong Ling, Pei-Lee Teh , “Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system” ELSEVIER, 2014.

Divyanshu Triapthi1 , Yash Kumar Singh2 , Rohit Singh, “A Review on Digital Image Steganography with its Techniques and Model”. IJSART – Volume 2 Issue 4– APRIL 2016. ISSN [ONLINE]: 2395-1052.


  • There are currently no refbacks.