Skip to main content
Top

2023 | OriginalPaper | Chapter

A Survey on Various Crypto-steganography Techniques for Real-Time Images

Authors : R. Tanya Bindu, T. Kavitha

Published in: Intelligent Cyber Physical Systems and Internet of Things

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Information is the wealth of every organization and in the modern-day when information is shared digitally and via the internet, protecting this treasure has become a top issue. Private photographs need to be protected from unwanted access due to security concerns raised by internet photo transfers. Nowadays, practically everyone shares their personal information online, including photographs, either with other users or in a database that attracts cyber criminals who can use it to their benefit. Steganography can be as a security tool to safely transmit secret information because it is one such technique where the presence of a confidential message cannot be detected. This article compares various steganography techniques, including AES, LSB, DCT, DWT, etc. are compared them with each other and also more advanced techniques involving Cryptography and Steganography i.e., sharing secret data using counting-based s and matrix-based to increase security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Soni M, Khare A, Jain S (2014) A survey of digital image processing and its problems. 4:2250–3153 Soni M, Khare A, Jain S (2014) A survey of digital image processing and its problems. 4:2250–3153
2.
go back to reference Rahmani MKI, Arora K, Pal N (2014) A crypto-steganography: a survey. 5(7) Rahmani MKI, Arora K, Pal N (2014) A crypto-steganography: a survey. 5(7)
3.
go back to reference Rao RM, Arora MK (2004) Overview of image processing. In: Advanced image processing techniques for remotely sensed hyperspectral data, pp 51–85 Rao RM, Arora MK (2004) Overview of image processing. In: Advanced image processing techniques for remotely sensed hyperspectral data, pp 51–85
4.
go back to reference Billingsley FC (1970) Applications of digital image processing. Appl Opt 9(2):289–299 Billingsley FC (1970) Applications of digital image processing. Appl Opt 9(2):289–299
5.
go back to reference Saxena E, Goswami N (2014) Automatic object detection in image processing: a survey. 2:2321–8169 Saxena E, Goswami N (2014) Automatic object detection in image processing: a survey. 2:2321–8169
6.
go back to reference Huang TS, Aizawa K Image processing: some challenging problems. 21:9766–9769 Huang TS, Aizawa K Image processing: some challenging problems. 21:9766–9769
7.
go back to reference Ahmad SS (2016) Steganography for inserting a message on the digital image using least significant bit and AES cryptographic algorithm. 1–6 Ahmad SS (2016) Steganography for inserting a message on the digital image using least significant bit and AES cryptographic algorithm. 1–6
8.
go back to reference Bhardwaj R, Khanna D (2015) Enhanced the security of image steganography through image encryption. 1–4 Bhardwaj R, Khanna D (2015) Enhanced the security of image steganography through image encryption. 1–4
9.
go back to reference Deshmukh P (2016) An image encryption and decryption using AES algorithm. 7:2229–5518 Deshmukh P (2016) An image encryption and decryption using AES algorithm. 7:2229–5518
10.
go back to reference Aparna VS, Rajana A, Jairaja I, Nandita B, Madhusoodanana P, Remya AAS (2020) Implementation of AES algorithm on text and image using MATLAB. 978-1-7281-4213-5 Aparna VS, Rajana A, Jairaja I, Nandita B, Madhusoodanana P, Remya AAS (2020) Implementation of AES algorithm on text and image using MATLAB. 978-1-7281-4213-5
11.
go back to reference Zhang Y, Li X, Hou W (2017) A fast image encryption scheme based on AES. 978-1-5090-6238-6 Zhang Y, Li X, Hou W (2017) A fast image encryption scheme based on AES. 978-1-5090-6238-6
12.
go back to reference Alsaffar DM, Sultan Almutiri A, Alqahtani B, Alamri RM, Fahhad Alqahtani H, Alqahtani NN, Mohammed alshammari G, Ali AA (2019) Image encryption based on AES and RSA algorithms. 978-1-5386-9439-8 Alsaffar DM, Sultan Almutiri A, Alqahtani B, Alamri RM, Fahhad Alqahtani H, Alqahtani NN, Mohammed alshammari G, Ali AA (2019) Image encryption based on AES and RSA algorithms. 978-1-5386-9439-8
13.
go back to reference Jain A, Sharma S (2019) A novel digital image encryption method based on RSA algorithm. 11. ISSN: 0973-7383 Jain A, Sharma S (2019) A novel digital image encryption method based on RSA algorithm. 11. ISSN: 0973-7383
14.
go back to reference AL-Shaaby AA, AlKharobi T (2017) Cryptography and steganography: new approach. 5. ISSN: 2054-7420 AL-Shaaby AA, AlKharobi T (2017) Cryptography and steganography: new approach. 5. ISSN: 2054-7420
15.
go back to reference Siper A, Farley R, LomBardo C (2005) The rise of steganography. Corpus ID: 110715828 Siper A, Farley R, LomBardo C (2005) The rise of steganography. Corpus ID: 110715828
16.
go back to reference Amarendra K, Mandhala VN, Gupta BC, Sudheshna GG, Anusha VV (2019) Image steganography using LSB. 8. ISSN: 2277-8616 Amarendra K, Mandhala VN, Gupta BC, Sudheshna GG, Anusha VV (2019) Image steganography using LSB. 8. ISSN: 2277-8616
17.
go back to reference Aggarwal A, Sangal A, Varshney A (2019) Image steganography using LSB algorithm. 11. ISSN: 0974-2255 Aggarwal A, Sangal A, Varshney A (2019) Image steganography using LSB algorithm. 11. ISSN: 0974-2255
18.
go back to reference Zhou Y, Wang C, Zhou X (2018) DCT-based color image compression algorithm using an efficient lossless encoder. ISSN: 2164-5221 Zhou Y, Wang C, Zhou X (2018) DCT-based color image compression algorithm using an efficient lossless encoder. ISSN: 2164-5221
19.
go back to reference Kumar YS, Kumar R, Kumar S (2020) 2D-Discrete cosine transform based dynamically controllable image compression technique. 978-1-7281-8911-6 Kumar YS, Kumar R, Kumar S (2020) 2D-Discrete cosine transform based dynamically controllable image compression technique. 978-1-7281-8911-6
20.
go back to reference Kumar SRS, Veeramachaneni S, Sk NM (2019) An efficient DFT implementation using modified group distributed arithmetic. 978-1-7281-1381-4 Kumar SRS, Veeramachaneni S, Sk NM (2019) An efficient DFT implementation using modified group distributed arithmetic. 978-1-7281-1381-4
21.
go back to reference Kour P (2015) Image processing using discrete wavelet transform. 3. ISSN: 2321-5984 Kour P (2015) Image processing using discrete wavelet transform. 3. ISSN: 2321-5984
22.
go back to reference Thakral S, Manhas P (2019) Image processing by using different types of discrete wavelet transform. 499–507 Thakral S, Manhas P (2019) Image processing by using different types of discrete wavelet transform. 499–507
23.
go back to reference Bisht A, Kumar A (2019) DWT chip design and FPGA synthesis for image processing. 8. ISSN: 2277-3878 Bisht A, Kumar A (2019) DWT chip design and FPGA synthesis for image processing. 8. ISSN: 2277-3878
24.
go back to reference Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. 5591–5619 Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. 5591–5619
26.
go back to reference Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. 7951–7985 Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. 7951–7985
27.
go back to reference Porwal S, Mittal S (2020) A threshold secret sharing technique based on matrix manipulation. 2214:020020 Porwal S, Mittal S (2020) A threshold secret sharing technique based on matrix manipulation. 2214:020020
29.
go back to reference Vinothkanna MR (2019) A secure steganography creation algorithm for multiple file formats. J Innovative Image Process (JIIP) 1(01):20–30 Vinothkanna MR (2019) A secure steganography creation algorithm for multiple file formats. J Innovative Image Process (JIIP) 1(01):20–30
30.
go back to reference Chatterjee R, Chakraborty R, Mondal JK (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wireless Syst 1(4):215–224 Chatterjee R, Chakraborty R, Mondal JK (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wireless Syst 1(4):215–224
Metadata
Title
A Survey on Various Crypto-steganography Techniques for Real-Time Images
Authors
R. Tanya Bindu
T. Kavitha
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_28

Premium Partner