Steganography is an art of writing secret information on the cover. Image Steganography refers to hiding secret text or image over the cover image. Information sharing over the channel or media is important nowadays. Shared information should be secured and confidential. The embedding of secret information on the cover image results in the Stego-Image. The Quality of the Stego-Image measured in terms of PSNR and the embedding Payload of the resultant image plays a vital role in imperceptibility of the Stego-Image. The imperception of Stego-Image depends on the number of bits altered during the embedding process. This is measured using a parameter called “psnr” and the number of bits embedded is the “payload”. A Literature Review is done on various methods for the embedding capacity and PSNR.

1.
Sumathi
C.P.
,
Santanam
T.
,
Umamaheswari
G.
A study of various steganographic techniques used for information hiding
. arXiv preprint arXiv:1401.5561.
2014
Jan 22.
2.
Eric
Cole
,
Ronald D.
Krutz
, Consulting Editor (
2003
),
Hiding in Plain Sight, Steganography and the Art of Covert Communication
,
Wiley Publishing, Inc
.
3.
Agarwal
M.
Text steganographic approaches: a comparison
. arXiv preprint arXiv:1302.2718.
2013
Feb 12.
4.
Kaur
H.
,
Rani
J.
A Survey on different techniques of steganography
.
InMATEC Web of Conferences
2016
(Vol.
57
, p.
02003
).
EDP Sciences
.
5.
Allen
T.
,
Thomas
Anu
V.,
Jerin
J.
,
Maria
P.D.
Hiding Host Image using a Cover Image
.
International Journal of Engineering Research & Technology.
2015
.
6.
Attaby
A.A.
,
Ahmed
M.F.
,
Alsammak
A.K.
Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3
.
Ain Shams Engineering Journal.
2018
Dec 1;
9
(
4
):
1965
74
.
7.
Qin
X.
,
Li
B.
,
Tan
S.
,
Zeng
J.
A novel steganography for spatial color images based on pixel vector cost
.
IEEE Access.
2019
Jan 7;
7
:
8834
46
.
8.
Pal
A.K.
,
Naik
K.
,
Agrawal
R.
A steganography scheme on JPEG compressed cover image with high embedding capacity
.
Int. Arab J. Inf. Technol.
2019
Jan 1;
16
(
1
):
116
24
.
9.
Tang
W.
,
Li
B.
,
Tan
S.
,
Barni
M.
,
Huang
J.
CNN-based adversarial embedding for image steganography
.
IEEE Transactions on Information Forensics and Security.
2019
Jan 7;
14
(
8
):
2074
87
.
10.
Liu
L.
,
Wang
A.
,
Chang
C.C.
,
Li
Z.
A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding
.
Int. J. Netw. Secur.
.
2017
May 1;
19
(
3
):
327
34
.
11.
Zhou
W.
,
Li
W.
,
Chen
K.
,
Zhou
H.
,
Zhang
W.
,
Yu
N.
Controversial ‘pixel’prior rule for JPEG adaptive steganography
.
IET Image Processing.
2018
Dec 13;
13
(
1
):
24
33
.
12.
Nguyen
T.S.
,
Chang
C.C.
,
Shih
T.H.
Effective reversible image steganography based on rhombus prediction and local complexity
.
Multimedia Tools and Applications.
2018
Oct;
77
(
20
):
26449
-
67
.
13.
Thanki
R.
,
Borra
S.
A color image steganography in hybrid FRT–DWT domain
.
Journal of information security and applications.
2018
Jun 1;
40
:
92
102
.
14.
Sara
K.
A new steganography method based on HIOP (Higher Intensity Of Pixel) algorithm and Strassen’s Matrix Multiplication
.
Journal of Global Research in Computer Science.
2011
Feb 14;
2
(
1
).
15.
Elharrouss
O.
,
Almaadeed
N.
,
Al-Maadeed
S.
An image steganography approach based on k-least significant bits (k-LSB).
In2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020 Feb 2
(pp.
131
135
).
IEEE
.
16.
Eyssa
A.A.
,
Abdelsamie
F.E.
,
Abdelnaiem
AE
.
An efficient image steganography approach over wireless communication systems
.
Wireless personal communications.
2020
Jan;
110
(
1
):
321
-
37
.
17.
Liu
H.H.
,
Lee
C.M.
High-capacity reversible image steganography based on pixel value ordering
.
EURASIP journal on image and video processing.
2019
Dec;
2019
(
1
):
1
5
.
18.
Rasras
R.J.
,
AlQadi
Z.A.
,
Sara
M.R.
A methodology based on steganography and cryptography to protect highly secure messages
.
Engineering, Technology & Applied Science Research.
2019
Feb 16;
9
(
1
):
3681
4
.
19.
Wen
J.
,
Zhang
J.
,
Zhou
J.
,
Li
Y.
,
Xue
Y.
An adaptive JPEG steganographic scheme based on run-length statistical complexity
.
Chinese Journal of Electronics.
2018
Jun 14;
27
(
1
):
52
9
.
20.
Hu
D.
,
Xu
H.
,
Ma
Z.
,
Zheng
S.
,
Li
B.
A spatial image steganography method based on nonnegative matrix factorization
.
IEEE signal processing letters.
2018
Jul 16;
25
(
9
):
1364
8
.
21.
Su
W.
,
Ni
J.
,
Li
X.
,
Shi
Y.Q.
A new distortion function design for JPEG steganography using the generalized uniform embedding strategy
.
IEEE Transactions on Circuits and Systems for Video Technology.
2018
Aug 14;
28
(
12
):
3545
9
.
22.
Chen
K.
,
Zhou
H.
,
Zhou
W.
,
Zhang
W.
,
Yu
N.
Defining cost functions for adaptive JPEG steganography at the microscale
.
IEEE Transactions on Information Forensics and Security.
2018
Sep 10;
14
(
4
):
1052
66
.
23.
Wang
Y.
,
Zhang
W.
,
Li
W.
,
Yu
X.
,
Yu
N.
Non-additive cost functions for color image steganography based on inter-channel correlations and differences
.
IEEE Transactions on Information Forensics and Security.
2019
Nov 28;
15
:
2081
95
.
24.
Yang
L.
,
Deng
H.
,
Dang
X.
A novel coverless information hiding method based on the most significant bit of the cover image
.
IEEE Access.
2020
Jun 9;
8
:
108579
91
.
25.
Ansari
A.S.
,
Mohammadi
M.S.
,
Parvez
M.T.
A comparative study of recent steganography techniques for multiple image formats
.
International Journal of Computer Network and Information Security.
2019
;
11
(
1
):
11
25
.
26.
Kumar
V.
,
Laddha
S.
,
Aniket
N.D.
Steganography techniques using convolutional neural networks
.
J. Homepage.
2020
Sep;
7
:
66
73
.
27.
Sharma
K.
,
Aggarwal
A.
,
Singhania
T.
,
Gupta
D.
,
Khanna
A.
Hiding data in images using cryptography and deep neural network
. arXiv preprint arXiv:1912.10413.
2019
Dec
22
.
28.
Singh
N.
High PSNR based image steganography
.
International Journal of Advanced Engineering Research and Science.
2019
Jan;
6
(
1
).
29.
Pramanik
S.
,
Singh
R.P.
,
Ghosh
R.
A new encrypted method in image steganography
.
Indonesian Journal of Electrical Engineering and Computer Science.
2019
Jun;
14
(
3
):
1412
9
.
30.
Denemark
T.
,
Fridrich
J.
Steganography with multiple JPEG images of the same scene
.
IEEE Transactions on Information Forensics and Security.
2017
May 18;
12
(
10
):
2308
19
.
31.
Surana
J.
,
Sonsale
A.
,
Joshi
B.
,
Sharma
D.
,
Choudhary
N.
Steganography Techniques
.
IJEDR.
2017
;
5
:
989
92
.
32.
Thangadurai
K.
,
Devi
G.S.
An analysis of LSB based image steganography techniques.
In2014 International Conference on Computer Communication and Informatics
2014
Jan 3 (pp.
1
4
).
IEEE
.
33.
Bandyopadhyay
S.K.
,
Bhattacharyya
D.
,
Ganguly
D.
,
Mukherjee
S.
,
Das
P.
A tutorial review on steganography
.
InInternational conference on contemporary computing
2008
Aug 7 (Vol.
101
, pp.
105
114
).
34.
Maheswari
S.U.
,
Hemanth
D.J.
Different methodology for image steganography-based data hiding
.
International Journal of Information and Communication Technology.
2015
;
7
(
4-5
):
521
36
.
35.
Saleh
MA
.
Image steganography techniques-a review paper
.
International Journal of Advanced Research in Computer and Communication Engineering
, ISSN.
2018
Sep:
2278
1021
.
This content is only available via PDF.
You do not currently have access to this content.