Skip to main content

Using Artificial Intelligence Approaches for Image Steganography: A Review

  • Conference paper
  • First Online:
Internet of Things—Applications and Future

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 114))

Abstract

Security of confidential information has been always an important issue. It has always been an interesting topic for researchers to develop secure techniques to send and receive data without revealing it to anyone rather than the receiver. Researchers are working every day to achieve a high level of security and consistency for their data during its transmission over the network. Cryptography is a way used to encrypt the data during its transmission so that when there is any attack, the message seen is not the real message, as it is encrypted. On the other hand, Steganography is a method of hiding secret messages in a cover object (image, audio, video, text) while communication takes place between sender and receiver. Steganography is often used with cryptography so that the information is doubly protected; First, it is encrypted and then hidden so that the attacker has to first detect the presence of information that is already hidden (a difficult task) and then decrypt it. In this paper, we will discuss different artificial intelligence techniques used to achieve maximum information hidden and high quality of image as the low quality is a sign of distortion which means that there is something hidden.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shrija, Somaraj., and Mohammed Ali Hussain, F. 2015. Performance and security analysis for image encryption using key image. Indian Journal of Science and Technology.

    Google Scholar 

  2. Kurukshetra University, Kurukshetra, Haryana. 2016. Image steganography using enhanced LSB technique. International Journal of Scientific & Engineering Research.

    Google Scholar 

  3. Ansari, Arshiya Sajid, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez. 2019. A Comparative Study of Recent Steganography Techniques for Multiple Image Formats. International Journal of Computer Network and Information Security.

    Google Scholar 

  4. Ram MR Seshan. 2016. Assistant professor, Department of computer science, Challenges in steganography. International Journal for Research in Applied Science & Engineering Technology (IJRASET).

    Google Scholar 

  5. Roy, Ratnakirti, Suvamoy Changder, Anirban Sarkar, Narayan C Debnat. 2013. Department of computer applications, National institute of technology, Durgapur, India, Department of computer science, Winona state university, MN, USA. Evaluating Image Steganography Techniques: Future Research Challenges, IEEE.

    Google Scholar 

  6. Kanan, Hamidreza Rashidy, Bahram Nazeri. 2014. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications.

    Google Scholar 

  7. Wang Shen, Bian Yang and Xiamu Niu. 2010. A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing.

    Google Scholar 

  8. Sanjutha, MK. 2018. M.Tech, Computer science engineering, An image steganography using particle swarm optimization and transform domain. International Journal of Engineering & Technology.

    Google Scholar 

  9. Ibrahim Saleh University of Mosul. 2016. Alauddin Al-Omary University of Bahrain, Apply Bee Colony Optimization for Image Steganography with Optical Pixel Adjustment. IJCDS Journal.

    Google Scholar 

  10. Ziyad Tariq Tikrit University. 2017. Ziyad Tariq Mustafa Al-Ta’i University of Diyala-College of Science, Image steganography between firefly and PSO algorithms. International Journal of Computer Science and Information Security.

    Google Scholar 

  11. Yang, X.S. 2010. Firefly Algorithm, Levy Flights and Global Optimization, Research and Development in Intelligent Systems XXVI: Incorporating Applications and Innovations in Intelligent Systems XVII, Springer, London, 209–218.

    Google Scholar 

  12. Vaishali Kulkarni M. S. 2018. Ramaiah University of Applied Sciences, Bengaluru, India, Veena V Desai Gogte Institute of Technology, Raghavendra V. Kulkarni M. S. Ramaiah University of Applied Sciences, Comparison of Firefly, Cultural and the Artificial Bee Colony Algorithms for Optimization, RUAS-SASTech Journal.

    Google Scholar 

  13. Kadhim, Inas Jawad, Prashan Premaratne, Peter James Vial, Brendan Halloran. 2018. Comprehensive survey of image steganography: Techniques, Evaluations and trends in future research, Elsevier.

    Google Scholar 

  14. Ms. Ankita Kadu, Prof. Arun Kulkarni, Prof. Deepali Patil. 2016. Secure data hiding using robust firefly algorithm. International Journal of Computer Engineering In Research Trends.

    Google Scholar 

  15. Kale K.V., Najran N.H. Aldawla, and M.M. Kazi. 2012. Steganography enhancement by combining text and image through wavelet technique. International Journal of computer & Applications (IJCA), 51(21):0975–8887.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeanne Georges .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Georges, J., Magdi, D.A. (2020). Using Artificial Intelligence Approaches for Image Steganography: A Review. In: Ghalwash, A., El Khameesy, N., Magdi, D., Joshi, A. (eds) Internet of Things—Applications and Future. Lecture Notes in Networks and Systems, vol 114. Springer, Singapore. https://doi.org/10.1007/978-981-15-3075-3_16

Download citation

Publish with us

Policies and ethics