There are various methods for concealing information or transmitting it covertly, with steganography being a prominent approach for secret communication. Unlike watermarking and fingerprinting, steganography aims to hide information in a way that its presence remains undetectable. Steganography is commonly applied to electronic media, particularly audio and image files. This paper provides an overview of image steganography, its applications, and different techniques. The objective is to outline the key features of an effective steganography algorithm. The ultimate goal is to develop a cross-platform solution capable of concealing a message within a digital image file. An image comprises numerous pixels, each with three color values, and is composed of millions of such numbers. Modifying a few color values in specific pixels typically results in an image that closely resembles the original. This paper introduces a technique that involves altering selected pixel color values based on the intensity criteria of colors in the image. The method strives to minimize image quality degradation, maintain information security, and, whenever possible, avoid changes in the image size.
Kaur, S., Bansal, S., & Bansal, R. K. (2014). Steganography and classification of image steganography techniques. In Proceedings of the 2014 International Conference on Computing for Sustainable Global Development (INDIACom). https://doi.org/10.1109/IndiaCom.2014.6828087
Baawi, S. S., Mokhtar, M. R., & Sulaiman, R. (2018). A comparative study on the advancement of text steganography techniques in digital media. ARPN Journal of Engineering and Applied Sciences, 13, 1854-1863.
Bhatt, S., Ray, A., Ghosh, A., & Ray, A. (2015). Image steganography and visible watermarking using LSB extraction technique. In Proceedings of the 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO). https://doi.org/10.1109/ISCO.2015.7282315
Bucerzan, D., & Raţiu, C. (2016). Testing methods for the efficiency of modern steganography solutions for mobile platforms. In Proceedings of the 2016 6th International Conference on Computers Communications and Control (ICCCC). https://doi.org/10.1109/ICCCC.2016.7496734
Chakraborty, S., Jalal, A. S., & Bhatnagar, C. (2017). LSB based non blind predictive edge adaptive image steganography. Multimedia Tools and Applications, 76(6), 7973-7987. https://doi.org/10.1007/s11042-016-3449-4
Cui, W., Liu, S., Jiang, F., Liu, Y., & Zhao, D. (2020). Multi-stage residual hiding for image-into-audio steganography. In Proceedings of the ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). https://doi.org/10.1109/ICASSP40776.2020.9054033
Dalal, M., & Juneja, M. (2018). Video steganography techniques in spatial domain: A survey. In Proceedings of the International Conference on Computing and Communication Systems. https://doi.org/10.1007/978-981-10-6890-4_67
Chandramouli, R., Kharrazi, M., & Memon, N. (2003). Image steganography and steganalysis: Concepts and practice. In Proceedings of the International Workshop on Digital Watermarking. https://doi.org/10.1007/978-3-540-24624-4_3
Emad, E., Safey, A., Refaat, A., Osama, Z., Sayed, E., & Mohamed, E. (2018). A secure image steganography algorithm based on least significant bit and integer wavelet transform. Journal of Systems Engineering and Electronics, 29(3), 639-649. https://doi.org/10.21629/JSEE.2018.03.21
Duan, X., Guo, D., Liu, N., Li, B., Gou, M., & Qin, C. (2020). A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access, 8, 25777-25788. https://doi.org/10.1109/ACCESS.2020.2971528
Joshi, K., Gill, S., & Yadav, R. (2018). A new method of image steganography using 7th bit of a pixel as an indicator by introducing the successive temporary pixel in the grayscale image. Journal of Computer Networks and Communications. https://doi.org/10.1155/2018/9475142
Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing, 335, 299-312. https://doi.org/10.1016/j.neucom.2018.06.075
Khan, S., Irfan, M. A., Arif, A., Ali, A., Memon, Z. A., & Khaliq, A. (2020). Reversible-enhanced stego block chaining image steganography: A highly efficient data hiding technique. Canadian Journal of Electrical and Computer Engineering, 43(2), 66-72. https://doi.org/10.1109/CJECE.2019.2938844
Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2019). Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73-80. https://doi.org/10.1109/TSMC.2019.2903785
Liu, J., Ke, Y., Zhang, Z., Lei, Y., Li, J., Zhang, M., & Yang, X. (2020). Recent advances of image steganography with generative adversarial networks. IEEE Access, 8, 60575-60597. https://doi.org/10.1109/ACCESS.2020.2983175
Khosravi,S. (2020). A Method to Hide Information in Image Based on Selected Pixels. Transactions on Machine Intelligence, 3(4), 251-259. doi: 10.47176/TMI.2020.251
MLA
Khosravi,S. . "A Method to Hide Information in Image Based on Selected Pixels", Transactions on Machine Intelligence, 3, 4, 2020, 251-259. doi: 10.47176/TMI.2020.251
HARVARD
Khosravi S. (2020). 'A Method to Hide Information in Image Based on Selected Pixels', Transactions on Machine Intelligence, 3(4), pp. 251-259. doi: 10.47176/TMI.2020.251
CHICAGO
S. Khosravi, "A Method to Hide Information in Image Based on Selected Pixels," Transactions on Machine Intelligence, 3 4 (2020): 251-259, doi: 10.47176/TMI.2020.251
VANCOUVER
Khosravi S. A Method to Hide Information in Image Based on Selected Pixels. Trans. Mach. Intell., 2020; 3(4): 251-259. doi: 10.47176/TMI.2020.251