An Extensive Survey of Digital Image Steganography: State of the Art

Idakwo M. A.,Muazu M. B.,Adedokun A. E.,Sadiq B. O
2024-04-30
Abstract:The need to protect sensitive information privacy duringinformation exchange over the internet/intranet has led towider adoption of cryptography and steganography. The cryptography approaches convert the information into an unreadable format however draws the attention of cryptanalyst owing to the uncommon random nature flow of the bytes when viewing the flowing structured bytes on a computer. While steganography, in contrast, conceals the very existence of covert communication using digital media. Although any digital media (text, image, video, audio) can covey the sensitive information, the media with higher redundant bits are more favorable for embedding the sensitive information without distorting the media. Digital images are majorly used in conveying sensitive information compared to others owing to their higher rate of tolerating distortions, highly available, smaller sizes with high redundant bits. However, the need for maximizing the redundancy bits for the optimum embedding of secret information has been a paramount issue due to the imperceptibility prerequisite which deteriorates with an increase in payload thus, resulting in a tradeoff. This has limited steganography to only applications with lower payload requirements, thus limiting the adoption for wider deployment. This paper critically analyzes the current steganographic techniques, recent trends, and challenges.
Emerging Technologies,Cryptography and Security
What problem does this paper attempt to address?
This paper focuses on the issue of digital image steganography. With the growth of sensitive information exchange on the internet, encryption and steganography have been widely adopted to protect information security. However, while encryption methods can transform information into unreadable formats, they may attract the attention of cryptanalysts and increase the risk of attacks. In contrast, steganography avoids attention by hiding secret communication within digital media, especially using digital images due to their high tolerance for errors and redundancy. Although any digital media can be used to hide sensitive information, images are more popular due to their high redundancy and tolerance for distortion. However, finding a balance between distortion and payload - maximizing the capacity to hide information without compromising image quality - is a key issue that restricts the use of steganography in applications requiring a large amount of hidden information. The paper provides an in-depth analysis of current steganography techniques, recent trends, and challenges, including methods in spatial domain, transform domain, and adaptive domain. It also discusses the importance of steganalysis, which is crucial for detecting hidden communication and currently relies mainly on statistical analysis techniques but still faces challenges such as low detection efficiency and susceptibility to image processing techniques. Furthermore, the paper introduces different steganography techniques, such as spatial domain methods based on Least Significant Bit (LSB), Pixel Value Differencing (PVD), and Diamond Encoding (DE), as well as transform domain methods such as Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), and Discrete Wavelet Transform (DWT). Additionally, adaptive domain steganography combines the characteristics of both spatial and transform domains in an attempt to find a better balance between maintaining image quality and resisting attacks. In summary, this paper aims to address how to improve the efficiency and robustness of steganography in hiding a large amount of sensitive information while ensuring image quality and security.