Enormous amounts of electronic data are produced and exchanged each day. However, two main concerns arise wherever electronic data is involved-privacy and security. Apart from protecting information, confidentiality and integrity of the original data should also be preserved. This is where an emerging technology called Reversible Data Hiding (RDH) comes into play. RDH is a method that allows the insertion of information into an encrypted image, without needing to decrypt the image first. It maintains the confidentiality of the data alongside retaining the original image pixels and reducing the degree of distortion. Hence because of its features, RDH proves to be a versatile solution for data transmission. Many reversible data hiding schemes were proposed like bit modification, integer transform-based RDH, error correction coding, etc. However, the main drawbacks were low hiding capacity and high distortion. Hence, steganography with cryptography was proposed. Cryptography encrypts data and is decrypted and processed by the intended users. Steganography hides the messages such that its existence could be detected only by the authorized users. The development of a graphical user interface (GUI) is a highlight of this review, as it showcases the combination of RSA and AES encryption algorithms. The GUI serves as a visual representation of the use of hybrid encryption and steganography to enhance security.

1.
Nandhini
Subramanian
,
Omar
Elharrouss
,
Somaya
Al-Maadeed
,
Ahmed
Bouridane
Image Steganography: A Review of the Recent Advances
”,
IEEE Access
,
2021
2.
Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne
,
U.K. A.H.M.
Kamal
,
Mohammad Mahfuzul
Islam
“A prediction error based histogram association and mapping technique for data embedment”,
2019
, Vol
48
,
Elsevier
, Available :
L.
Yang
,
H.
Deng
,
X.
Dang
,
A novel coverless information hiding method based on the most signifcant bit of the cover image
.
IEEE Access
8
,
108579
108591
(
2020
)
3.
Fengyong
Li
,
Lianming
Zhang
,
Chuan
Qin
, Kui “
Reversible data hiding for JPEG images with minimum additive distortion
”,
2022
, Vol
595
, Elsevier, Available :
4.
Rajeev
Kumar
,
Ki-Hyun
Jung
Robust reversible data hiding scheme based on two-layer embedding strategy
”,
2020
, Vol
512
, Elsevier, Available :
5.
Z.
Yin
,
Y.
Xiang
,
X.
Zhang
,
Reversible data hiding in encrypted images based on multi-MSB prediction and huffman coding
,
IEEE Trans. Multimedia
22
(
4
) (
2020
)
874
884
6.
J.
Fridrich
,
J.
Kodovsky
,
Rich models for steganalysis of digital images
.
IEEE Trans. Inf. Forensics Secur.
7
,
868
882
(
2012
)
7.
Yingqiang
Qiu
,
Qichao
Ying
,
Xiaodan
Lin
,
Yaowen
Zhang
, and
Zhenxing
Qian
Reversible Data Hiding in Encrypted Images With Dual Data Embedding
.”,
2020
,
IEEE Access, Digital Object Identifier
8.
G.D.
Su
,
Y.
Liu
,
C.C.
Chang
,
A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images
.
J. Vis. Commun. Image Represent.
64
,
102618
(
2019
)
9.
Z.
Zhou
,
Y.
Cao
,
X.
Sun
,
Coverless information hiding based on bag-of-words model of image
.
J. Appl. Sci.
34
,
527
536
(
2016
)
10.
C.C.
Chang
,
C.T.
Li
,
K.
Chen
,
Privacy-preserving reversible information hiding based on arithmetic of quadratic resi-dues
.
IEEE Access
7
,
54117
54132
(
2019
)
11.
W.
Luo
,
F.
Huang
,
J.
Huang
,
Edge adaptive image steganography based on LSB matching revisited
.
IEEE Trans. Inf. Forensics Secur.
5
,
201
214
(
2010
)
12.
G.D.
Su
,
C.C.
Chang
,
C.C.
Lin
,
Efective self-recovery and tampering localization fragile watermarking for medical images
.
IEEE Access
8
,
160840
160857
(
2020
).
13.
K.
Zhiwei
,
L.
Jing
,
H.
Yigang
,
Steganography based on wavelet transform and modulus function
.
J. Syst. Eng. Electron.
18
,
628
632
(
2007
)
14.
G.S.
Lin
,
Y.T.
Chang
,
W.N.
Lie
,
A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm
.
IEEE Trans. Multimedia
12
,
345
357
(
2010
)
15.
F.
Huang
,
J.
Huang
,
Y.Q.
Shi
,
New channel selection rule for JPEG steganography
.
IEEE Trans. Inf. Forensics Secur.
7
,
1181
1191
(
2012
)
16.
Z.M.
Lu
,
S.Z.
Guo
,
Lossless information hiding in images
.
Syngress
2017
,
143
204
(
2017
)
17.
W.H.
Chen
,
Color image steganography scheme using set partitioning in hierarchical trees coding, digital fourier transform and adaptive phase modulation
.
Appl. Math. Comput.
185
,
432
448
(
2007
)
18.
Z.
Zhou
,
Q.J.
Wu
,
C.N.
Yang
,
X.
Sun
,
Z.
Pan
,
Coverless image steganography using histograms of oriented gradients based hashing algorithm
.
J. Internet Technol.
18
,
1177
1184
(
2017
)
19.
C.
Yuan
,
Z.
Xia
,
X.
Sun
,
Coverless image steganography based on SIFT and BOF
.
J. Internet Technol.
18
,
435
442
(
2017
)
20.
E.E.D.
Hemdan
,
An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images, Multimed
.
Tools. Appl.
80
(
2
) (
2021
)
1749
1777
.
21.
D.
Han
,
J.
Yang
,
W.
Summers
.
Inject steganography into cybersecurity education. (2017
)
31st International Conference on IEEE Advanced Information Networking and Applications Workshops (WAINA
) (
2017
), pp.
50
55
.
22.
G.
Alvarfz
,
S.
Li
,
Some basic cryptographic requirements for chaos-based cryptosystems
,
Int. J. Bifurcation Chaos
16
(
08
) (
2006
)
2129
2151
23.
C.C.
Chang
,
C.T.
Li
,
Y.Q.
Shi
,
Privacy-aware reversible watermarking in cloud computing environments
.
IEEEAccess
6
,
70720
70733
(
2018
)
24.
G.D.
Su
,
C.C.
Chang
,
C.C.
Lin
,
Efective self-recovery and tampering localization fragile watermarking for medical images
.
IEEE Access
8
,
160840
160857
(
2020
)
25.
J.
Wang
,
X.
Chen
,
J.
Ni
,
N.
Mao
,
Y.
Shi
,
Multiple histograms based reversible data hiding: framework and realization. IEEE Trans
.
Circuits Syst. Video Technolo.
30
,
2313
3232
(
2019
)
This content is only available via PDF.
You do not currently have access to this content.