Hiding Images in the Spatial Domain

Sahera Abued Sead Almola

Abstract


 Nowadays, steganography has become a useful technology and the interest in it has increased due to the rapid growth in the use of the internet, and it is applied to transmit information secretly using various techniques. Hiding is one of the main important techniques in steganography, which is the science of hiding secure information inside the carrier body to provide secure communication via the internet, so that only the sender and receiver can identify and reveal it. In stealth, many different forms of carrier can be used such as image, video, protocol, and audio. The digital image is most commonly used as a vector file because of its frequency on the internet. There are many changing techniques of steganography, and each has strengths and weaknesses.                                                                        

In this study, we conducted a review of techniques used for hiding in the spatial domain to explore the term hiding by reviewing and collecting different studies related to this field published from 2015 to 2021. This study evaluated nine proposed approaches to address this problem. Three metrics - image quality, message capacity, and security - were used to evaluate each method. Finally, the results are presented and summarized, since the capacity and quality of the hiding image are important for a good approach. There is a trade-off between the amount of confidential data that can be included, image distortion, and the security of image hiding. The disadvantages of each method are also identified, which serve as the basis for future research. Along with a complete review of the basic concepts of steganography additionally, types of steganography and interest in image steganography based on spatial domain are presented.                                                                                                                            

Furthermore, the criteria most commonly used to evaluate steganography performance in terms of non-perception, payload capacity, and robustness are addressed. Each spatial domain technology attempts to meet the most important steganographic design requirements of (1) maintaining non-perception at a good level, (2) high capacity payload, and (3) robustness against intruder attacks. But in truth, the perfect steganography system does not exist, and it may be another lacking in robustness. for example ,It has a high ability but suffers from lack of resistance to statistical attacks. Therefore, when designing an LSB hiding scheme file a balance must be struck between the requirements for hiding information. A good recommendation from the techniques reviewed is that the combination of steganography and encryption techniques increases the confidentiality of the hidden message.


Full Text:

PDF

References


F.A. Petitcolas, R.J. Anderson, M.G. Kuhn, "Information hiding-a survey", Proceedings of the IEEE, 87 (1999) 1062-1078.

Yang, Chunfang., Liu, Fenlin., Luo, Xiangyang., and Zeng, Ying., “Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 1, January 2013.

Yang H., Xingming Sun and Guang Sun, (2009), "A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution", Radioengineering, Vol. 18,No. 4.

Huang, Hui-Yu. and Shih-Hsu Chang, (2011), "Lossless Data-hiding Technique based on Wavelet Transform", MVA2011 IAPR Conference on Machine Vision Applications, June 13-15.

Mohammed Mahdi Hashim,Ali Alwan"A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN",University Technology Malaysia,JohorBahru,Malaysia.

Marwa M. Emam ,Abdelmgeid A. Aly ,Fatma A. Omara ," A Modified Image Steganography Method based on LSB Technique", International Journal of Computer Applications (0975 – 8887) Volume 125 – No.5, September 2015.

Mehdi Hussain and Mureed Hussain,Shaheed Zulfiqar Ali “A Survey of Image Steganography Techniques”Bhutto Institute of Science & Technology, (SZABIST), Islamabad, Pakistan.

Bushra Abdullah Shtayt1, Assist Prof. Dr. Nur Haryani Binti Zakaria2, Dr. Nor Hazlyna Harun3"A Comprehensive Review of Spatial Domain-Based Image Steganography Techniques"1,2,3Universiti Utara Malaysia, School of Computing, College of Art and Sciences,2020.

Marwa M. Emam ,Abdelmgeid A. Aly ,Fatma A. Omara ," A Modified Image Steganography Method based on LSB Technique", International Journal of Computer Applications (0975 – 8887) Volume 125 – No.5, September 2015.

Praneetha, S. R. (2015). Video stegenography by intermediate significant biplanes. International Journal of Computer Science and Information Technologies, 6(5), 4646- 4650.

Gandharba Swain, Saroj Kumar Lenka," A novel steganography technique by mapping words with LSB array", Article in International Journal of Signal and Imaging Systems Engineering · January 2015,DOI: 10.1504/IJSISE.2015.067052

Marghny H. Mohamed, Loay M. Mohamed, " High Capacity Image Steganography Technique based on LSB Substitution Method", Appl. Math. Inf. Sci. 10, No. 1, 259-266 (2016) .

30. K. MUHAMMAD, J. AHMAD, H. FARMAN, Z. JAN," A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images", Sindh Univ. Res. Jour. (Sci. Ser.) vol. 47 (4) 723-728 (2015).

Sura I.Mohammed Ali,Maryam Ghazi,Lateef Qudr, "A private domains approach for improved msb steganography image", Periodicals of Engineering and Natural Sciences ISSN 2303-4521 Vol. 7, No. 3, September 2019, pp.1405-1411.

Govind R. Suryawanshi, Suresh N. Mali," Analysis of Effect of Spatial Domain Steganography Technique on DCT Domain using Statistical Features for Digital Images",

International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 1 (2018) pp. 634-640.

GHAZANFAR F. SIDDIQUI , MUHAMMAD Z. IQBAL, KHALID S., ZAFAR S.,ADEEL A.,IBRAHIM A. HAMEED , MUHAMMAD F.,"A Dynamic Three-Bit Image Steganography Algorithm for Medical and e-Healthcare Systems", Received August 28, 2020, accepted September 19, 2020, date of publication October 2, 2020, date of current version October 15, 2020.




DOI: https://doi.org/10.31449/inf.v46i8.4252

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.