Review on various image protection methods

Authors

  • Ekhlas Ghaleb Abdulkadhim sanaa.h@uokerbala.edu.iq
  • Sanaa Hammad Dhahi College of Tourism Science , University of Kerbala, Kerbala 5006, Iraq
  • Meeras Salman Al-Shemarry College of Computer Science and Information Technology, University of Kerbala, Kerbala 5006, Iraq

DOI:

https://doi.org/10.29304/jqcsm.2023.15.41364

Keywords:

Steganography, Cryptography, Information Hiding, Data Protection, Hiding Techniques

Abstract

The security of information exchange over email and other web-based means is rather low, and there is the risk of interception when it comes to confidential information (e.g., credit card info). Therefore, online users should be ensured of the security and privacy of their web interactions. Despite the remarkable benefits of the Internet in the modern era and its contribution to digital communication, the information security of open networks has become an important issue due to its heavy costs. Several approaches have been used to address this issue, particularly through information hiding and encryption in system security strategies. Cryptography is the process of information encryption, and steganography refers to information hiding. These methods have proven quite effective in maintaining information security. Cryptography involves making changes to confidential information, which prevents their readability by eavesdroppers, which could also be considered a technique of original text to cipher text. On the other hand, steganography entirely hides confidential information from unauthorized users using multiple carrier formats, including audio, video, protocol, and images. Given the availability of digital images, they are often employed as carrier files online. Other approaches to image steganography are also common and have specific limitations and advantages. The present study aimed to review different methods of image cryptography and steganography and compare the studies in this regard so as to determine which the best, specific  and accurate methods of information security.

Downloads

Download data is not yet available.

References

Rakhra, Manik, Rajan Kumar, and Himdweep Walia. "A Review on Data hiding using Steganography and Cryptography." 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO). IEEE, 2021.‏

Hureib, Eshraq S., and Adnan A. Gutub. "Enhancing medical data security via combining elliptic curve cryptography and image steganography." Int. J. Comput. Sci. Netw. Secur.(IJCSNS) 20.8 (2020): 1-8.‏

MAHMOOD, ALI SHAKIR, MOHD RAHIM, and MOHD SHAFRY. "GENERATING AND EXPANDING OF AN ENCRYPTION KEY BASED ON KNIGHT TOUR PROBLEM." Journal of Theoretical & Applied Information Technology 95.7 (2017).

Kumar, Manish, et al. "Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique." 2022 Second international conference on artificial intelligence and smart energy (ICAIS). IEEE, 2022.‏

Chavali, Surya Teja, et al. "Comparative Study of Image Encryption and Image Steganography Using Cryptographic Algorithms and Image Evaluation Metrics." Semantic Intelligence: Select Proceedings of ISIC 2022. Singapore: Springer Nature Singapore, 2023. 297-311.‏

Varsha, Rajender Singh Chhillar, “Data Hiding Using Steganography and Cryptography”, International Journal of Computer Science and Mobile Computing, Vol. 4, Issue. 4, pg.802 – 805, April 2015.

Suryawanshi, Govind R., and Suresh N. Mali. "Analysis of Effect of Spatial Domain Steganography Technique on DCT Domain using Statistical Features for Digital Images." International Journal of Applied Engineering Research 13.1 (2018): 634-640.‏

Rejani, R., D. Murugan, and Deepu V. Krishnan. "Digital data protection using steganography." ICTACT J. Commun. Technol 7.1 (2016): 1245-1254.‏

Survase, Poonam, and P. Survase. "Qr code based image steganography with enhanced image quality and compression." International Journal for Innovative Research in Science and Technology 2.5 (2015): 104-112.‏

Dehare, Praneeta, and Padma Bonde. "Hiding image in image by using FMM with LSB substitution in image steganography." International Journal of Advance Research in Computer Science and Management Studies 2.11 (2014): 455-458.‏

Naoum, Reyadh Shaker. Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network. Diss. Middle East University, 2015.‏

HASHIM, MOHAMMED MAHDI, MOHD RAHIM, MOHD SHAFRY. "IMAGE STEGANOGRAPHY BASED ON ODD/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION." Journal of Theoretical & Applied Information Technology 95.19 (2017).

MAHMOOD, ALI SHAKIR, MOHD RAHIM, and MOHD SHAFRY. "GENERATING AND EXPANDING OF AN ENCRYPTION KEY BASED ON KNIGHT TOUR PROBLEM." Journal of Theoretical & Applied Information Technology 95.7 (2017).

Taha, Mustafa Sabah, et al. "Combination of steganography and cryptography: A short survey." IOP conference series: materials science and engineering. Vol. 518. No. 5. IOP Publishing, 2019.‏

Raj, UA Solomon, and C. P. Maheswaran. "Secure File Sharing System Using Image Steganography and Cryptography Techniques." 2023 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2023.‏

Subhash Panwar, Shreenidhi D amani, “ Digital Image Steganography Using Modified LSB and AES Cryptography”, International Journal of Recent Engineering Research and Development (IJRERD), Volume 03 – Issue 06, Pg. 18-27, June 2018.

Aishwarya Pandey, Jharna Chopra, “Steganography Using AES and LSB Techniques”, International Journal of Scientific Research Engineering & Technology (IJSRET), Volume 6, Issue 6, Pg: June 2017620-623.

Namrata Singh, “International Journal of Advanced Engineering Research and Science (IJAERS)”, Vol-6, Issue-1,Pg: 109-115 Jan- 2019.

Aung Myint Aye, LSB Based Image Steganography for Information Security System, International Journal of Trend in Scientific Research and Development (IJTSRD), Volume - 3 Issue – 1,PP: 394-400 Nov – Dec 2018.

Ashish S, Manjunath P, K S Prateek, “Data Embedding using Image Steganography”, International Research Journal of Engineering and Technology (IRJET), Volume: 06 Issue: 05 ,PP: 1356-1359May 2019. [21] Vikas M, Yashwanth E, ” Hybrid Approach to Text & Image Steganography using AES and LSB Technique”, International Research Journal of Engineering and Technology (IRJET), Volume: 05 Issue: 04 , Pg:1500-1502 Apr-2018.

Pravin B. Desai, Pradip S. Bhendwade,” Image Steganography Using LSB Algorithm”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineerin, Vol. 5, Issue 8, PP: 6883-6890 August 2016.

Naveen Verma, Preeti Sondhi,” LSB Based Stegnography to Enhance the Security of an Image”, International Journal of Trend in Scientific Research and Development (IJTSRD), Volume: 3, Issue: 4 , PP: 1480-1484 May-Jun 2019.

K B Shiva Kumar, K B Raja, Sabyasachi Pattnaik, “Hybrid Domain in LSB Steganography”, International Journal of Computer Applications , Volume 19– No.7, pg: 36-40, April 2011.

Pooja Rani, Preeti Sharma, “Cryptography Using Image Steganography”,International Journal of Computer Science and Mobile Computing, Vol. 5, Issue. 7, pg.451 – 456, July 2016.

Ammad Ul Islam, Faiza Khalid, “An Improved Image Steganography Technique based on MSB using Bit Differencing”, International conference on innovative computing techninology, Pg: 265-269, 2016.

Souvik Kumar, Kuntal Ghosh, “Data Hiding by Image Steganography Applying DNA Sequence Arithmetic & LSB Insertion”, Journal for Research Volume 02, Issue 04 , pg: 49-57,June 2016.

Suresh, Arul, and R. Balasubramanian. "A Systematic Review on Spatial Domain Steganography & Cryptography Techniques." Turkish Online Journal of Qualitative Inquiry 12.6 (2021).‏

Downloads

Published

2023-12-30

How to Cite

Ghaleb Abdulkadhim, E., Hammad Dhahi , S., & Salman Al-Shemarry, M. (2023). Review on various image protection methods. Journal of Al-Qadisiyah for Computer Science and Mathematics, 15(4), COMP. 41–47. https://doi.org/10.29304/jqcsm.2023.15.41364

Issue

Section

Computer Articles