Skip to main content

2023 | OriginalPaper | Buchkapitel

Image Interpolation-Based Steganographic Techniques Under Spatial Domain: A Survey

verfasst von : Riya Punia, Aruna Malik

Erschienen in: Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Whenever any data is embedded inside any image, then there is always some distortion caused, which caught the attention of attackers. As a consequence of this, there is always a need to reach a balance between the image quality and the embedding capacity of the picture. The researchers working in the field of data hiding have two basic objectives: one is to boost the performance of the suggested algorithms, and the other is to give a better capacity for embedding. This survey paper focuses on various traditional interpolation methods and interpolation-based data hiding techniques for the past few years. Also, the goal of this survey is to offer an in-depth evaluation of current up-to-date approaches, as well as their benefits and drawbacks if any. This survey paper concludes with some research recommendations that can be used in the future to enhance both embedding capacity as well as image visual quality.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kharrazi M, Sencar HT, Memon ND (2006) Performance study of common image steganography and steganalysis techniques. J Electron Imaging 15(4):041104CrossRef Kharrazi M, Sencar HT, Memon ND (2006) Performance study of common image steganography and steganalysis techniques. J Electron Imaging 15(4):041104CrossRef
2.
Zurück zum Zitat Kaur H, Rani J (2016) A Survey on different techniques of steganography. In: MATEC web of conferences, vol 57, p 02003. EDP Sciences Kaur H, Rani J (2016) A Survey on different techniques of steganography. In: MATEC web of conferences, vol 57, p 02003. EDP Sciences
3.
4.
Zurück zum Zitat Lee C-F, Huang Y-L (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247CrossRef Lee C-F, Huang Y-L (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247CrossRef
5.
Zurück zum Zitat Hussain M, Wahab AWA, Idris YIB, Ho ATS, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process: Image Commun 65:46–66 Hussain M, Wahab AWA, Idris YIB, Ho ATS, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process: Image Commun 65:46–66
6.
Zurück zum Zitat Liu YC, Wu HC, Yu SS (2011) Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multimedia Tools Appl 52(2):263–276CrossRef Liu YC, Wu HC, Yu SS (2011) Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multimedia Tools Appl 52(2):263–276CrossRef
8.
Zurück zum Zitat Alqahtani JA (2018) Steganalysis algorithm for PNG images based on fuzzy logic technique Alqahtani JA (2018) Steganalysis algorithm for PNG images based on fuzzy logic technique
9.
Zurück zum Zitat Jung K-H, Yoo K-Y (2009) Data hiding method using image interpolation. Comput Standards Interfaces 31(2):465–470CrossRef Jung K-H, Yoo K-Y (2009) Data hiding method using image interpolation. Comput Standards Interfaces 31(2):465–470CrossRef
10.
Zurück zum Zitat Jiang N, Zhao N, Wang L (2016) LSB based quantum image steganography algorithm. Int J Theor Phys 55(1):107–123CrossRefMATH Jiang N, Zhao N, Wang L (2016) LSB based quantum image steganography algorithm. Int J Theor Phys 55(1):107–123CrossRefMATH
11.
Zurück zum Zitat Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474CrossRefMATH Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474CrossRefMATH
12.
Zurück zum Zitat Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9-10):1613–1626CrossRefMATH Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9-10):1613–1626CrossRefMATH
13.
Zurück zum Zitat Kim KJ, Jung KH, Yoo KY (2008) A high capacity data hiding method using PVD and LSB. In 2008 International Conference on Computer Science and Software Engineering. IEEE. Vol. 3, pp. 876–879 Kim KJ, Jung KH, Yoo KY (2008) A high capacity data hiding method using PVD and LSB. In 2008 International Conference on Computer Science and Software Engineering. IEEE. Vol. 3, pp. 876–879
14.
Zurück zum Zitat Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447–455CrossRef Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447–455CrossRef
15.
Zurück zum Zitat Yang CH, Wang SJ, Weng CY (2010) Capacity-raising steganography using multi-pixel differencing and pixel-value shifting operations. Fundamenta Informaticae 98(2-3):321–336MathSciNet Yang CH, Wang SJ, Weng CY (2010) Capacity-raising steganography using multi-pixel differencing and pixel-value shifting operations. Fundamenta Informaticae 98(2-3):321–336MathSciNet
16.
Zurück zum Zitat Shen S, Huang L, Tian Q (2015) A novel data hiding for color images based on pixel value difference and modulus function. Multimedia Tools and Appl 74:707–728CrossRef Shen S, Huang L, Tian Q (2015) A novel data hiding for color images based on pixel value difference and modulus function. Multimedia Tools and Appl 74:707–728CrossRef
17.
Zurück zum Zitat Swain G (2016) Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools and Appl 75(21):13541–13556CrossRef Swain G (2016) Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools and Appl 75(21):13541–13556CrossRef
18.
Zurück zum Zitat Khodaei M, Sadeghi Bigham B, Faez K (2016) Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybern Syst 47(8):617–628CrossRef Khodaei M, Sadeghi Bigham B, Faez K (2016) Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybern Syst 47(8):617–628CrossRef
19.
Zurück zum Zitat Tsai P, Yu-Chen H, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143CrossRefMATH Tsai P, Yu-Chen H, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129–1143CrossRefMATH
20.
Zurück zum Zitat Lu T-C, Chang C-C, Huang Y-H (2014) High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimedia Tools Appl 72(1):417–435CrossRef Lu T-C, Chang C-C, Huang Y-H (2014) High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimedia Tools Appl 72(1):417–435CrossRef
21.
Zurück zum Zitat Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306CrossRef Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306CrossRef
22.
Zurück zum Zitat Malik A, Sikka G, Verma HK (2017) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimedia Tools Appl 76(11):13025–13046 Malik A, Sikka G, Verma HK (2017) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimedia Tools Appl 76(11):13025–13046
23.
Zurück zum Zitat Chang Y-T, Huang C-T, Lee C-F, Wang S-J (2013) Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J Supercomput 66(2):1093–1110CrossRef Chang Y-T, Huang C-T, Lee C-F, Wang S-J (2013) Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J Supercomput 66(2):1093–1110CrossRef
24.
Zurück zum Zitat Zhang X, Sun Z, Tang Z, Chunqiang Y, Wang X (2017) High capacity data hiding based on interpolated image. Multimedia Tools Appl 76(7):9195–9218CrossRef Zhang X, Sun Z, Tang Z, Chunqiang Y, Wang X (2017) High capacity data hiding based on interpolated image. Multimedia Tools Appl 76(7):9195–9218CrossRef
25.
Zurück zum Zitat Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712–6719CrossRef Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712–6719CrossRef
26.
Zurück zum Zitat Malik A, Sikka G, Verma HK (2017) Image interpolation based high capacity reversible data hiding scheme. Multimedia Tools Appl 76(22):24107–24123CrossRef Malik A, Sikka G, Verma HK (2017) Image interpolation based high capacity reversible data hiding scheme. Multimedia Tools Appl 76(22):24107–24123CrossRef
27.
Zurück zum Zitat Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan kaufmann. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan kaufmann.
28.
Zurück zum Zitat Shaik A (2019) High capacity reversible data hiding using 2D parabolic interpolation. Multimedia Tools Appl 78(8):9717–9735CrossRef Shaik A (2019) High capacity reversible data hiding using 2D parabolic interpolation. Multimedia Tools Appl 78(8):9717–9735CrossRef
29.
Zurück zum Zitat Malik A, Sikka G, Verma HK (2020) A reversible data hiding scheme for interpolated images based on pixel intensity range. Multimedia Tools Appl 79(25):18005–18031CrossRef Malik A, Sikka G, Verma HK (2020) A reversible data hiding scheme for interpolated images based on pixel intensity range. Multimedia Tools Appl 79(25):18005–18031CrossRef
30.
Zurück zum Zitat Hu WW, Zhou R-G, Li YC (2019) Quantum watermarking based on neighbor mean interpolation and LSB steganography algorithms. Int J Theor Phys 58(7):2134–2157MathSciNetCrossRefMATH Hu WW, Zhou R-G, Li YC (2019) Quantum watermarking based on neighbor mean interpolation and LSB steganography algorithms. Int J Theor Phys 58(7):2134–2157MathSciNetCrossRefMATH
Metadaten
Titel
Image Interpolation-Based Steganographic Techniques Under Spatial Domain: A Survey
verfasst von
Riya Punia
Aruna Malik
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-1479-1_50