International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.10, No.9, Sep. 2018

Performance Comparison of Steganography Techniques

Full Text (PDF, 1054KB), PP.37-46

Views:122   Downloads:2


Rinku Sharma, Reema Ganotra, Sangeeta Dhall, Shailender Gupta

Index Terms



Confidentiality calls for substantial research and development in network security and data communication. Several techniques have been proposed for the past decades to ensure secure and confidential transmission of data. Steganography is a significant method of hiding data in another media, such that it is physically and virtually invisible. It is used primarily to ensure secure communication in an indiscernible fashion so that the hidden information is not discovered at any stage. The goal is to hide the presence of secret information rather than the contents of information to avoid breaching of data confidentiality. This paper is an effort to bring about a comparison of some of the recent techniques used for steganography on the basis of embedding capacity and Peak signal to noise ratio (PSNR), Universal image quality index (UIQI), Number of pixel change rate (NPCR) and correlation. The performance metrics undertaken are robustness, security analysis and perceptual quality. The techniques were implemented in MATLAB 2013a v

Cite This Paper

Rinku Sharma, Reema Ganotra, Sangeeta Dhall, Shailender Gupta,"Performance Comparison of Steganography Techniques", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.9, pp.37-46, 2018.DOI: 10.5815/ijcnis.2018.09.04


[1]Piyush Marwah (2010) Visual Cryptography Steganography in images. In processing of second International conference on Computing, Communication and networking Technologies, pp. 1-6.

[2]Gokul M, Umeshbabu R, Vasudevan SK (2012) Hybrid Steganography using Visual cryptography and LSB encryption method. Int J computes Appl 59 5-8.

[3]S.M. Masud Karim, Rahman MS (2011) A new approach for LSB based Image steganography using secret key. In proceedings of 14th international conference on computer and information Technology, pp. 286-291.

[4]Shailender Gupta, Ankur Goyal, Bharat Bhushan (2012) Information hiding using least significant steganography and cryptography. In I.J. Modern Education and Computer Science 6: 27-34.

[5]Chaudhary D, Gupta S, Kumari M (2016) A novel hybrid security mechanism for data communication networks. International Journal of information privacy, Security and integrity 2(3):2166-231. 

[6]Ritesh B, Shailender Sharma G (2016) An innovative image encryption scheme based on chaotic map and vigenere scheme. Multimedia Tools and Application 1-34. doi:10.1007/s11042-016-3926-9.

[7]Chaudhary D, Gupta S, Sweety Deswal (2015) origin of Hybrid security mechanism and ways of improvement. In international journal of Big Data security Intelligence doi:10.21742/ijbdsi.2015.2.2.01 pp. 1-22.

[8]Nivedhita R. and meyyappan T. (2012) Image security using Steganography and Cryptography Techniques. In international journal of Engineering trends and Technology, Vol. 3, pp.366-371.

[9]Mohammad A, Yahya A (2010) public- Key steganography based on matching method. Eur j Sci Res 40(2):223-231.

[10]Ramakrishna Mathe, Atukuri V, and Devireddy SK, (2012) securing Information Cryptography and steganography. In International Journal of Computer Science and Information Technologies, Vol.3, pp 4251-4255.

[11]Islam MR, Siddiqa A, Uddin MP(2014) An efficient filtering based approach improving LSB image Steganography using status bit along with AES cryptography. In proceedings of 3rd International Conference on informatics, Electronics and vision, pp 1-6.

[12]Shingote Parshuram N, Syed A (2014) Advanced security using Cryptography and LSB matching Steganography. International journal of comp. and Elec. Research 3(2):52-55.

[13]S. Gupta, A Goyal, B Bhushan (2012) Information hiding using least significant bit steganography and Cryptography. In I.j. Modern Education and comp. Science 6:27-34.

[14]Tayal N., Bansal R., Dhal S., Gupta S (2016) A novel hybrid security mechanisms for data Communication networks. Doi: 10.1007/s11042-016-4111-x.

[15]Singh, A., Malik (2013) securing data by using cryptography with steganography. In international journal of advanced research in comp. science and software Eng. pp. 404-409, ISSN: 2277-128X.

[16]Nivedhitha R, DT Meyyappan, Phil M (2012) Image security using steganography and cryptographic techniques. In international journal of engineering trends and technology, vol. 3, pp. 366-371.

[17]Shamir A (1979) How to share a secret comm. ACM 22(11): 612-613.

[18]V. Padmavathi, B.V. Vardhan, A. V. N Krishna (2016) Quantum Cryptography and Quantum Key Distribution Protocols: A Survey. 2016 IEEE 6th international conference on Advanced Computing DOI:10.1109/IACC.2016.109.

[19]Ahmed A. Abd EI-Latif, Li Li, Ning wang, Qi Han, Xiamu Niu (2012) A new approach to chaotic image encryption based on Quantum Chaotic System, exploiting Color spaces. Doi: 10.1016/j.sigpro.2013.03.031.

[20]Alvarez G., S. Li, (2006) some basic cryptography requirement for chaos-based cryptosystem, international journal of bifurcation and chaos 16.2129-2151.