Color Image Steganography Techniques - A Review

January 2, 2018


Steganography is defined as the study of covert communication. Steganography ordinarily deals with the ways of hiding. The presence of the communicated data in such a way that it remains secret. It provide secrecy between two communicating parties. In color image steganography, secrecy is achieved  by embedding data into cover image and gives a stego-image. There are various types of steganography techniques each have their advantages and disadvantages. In this paper, we review the comparison between two different steganography method name as Jsteg and JMQT that are used to implement  a color image steganography. In section 1st we have discussed about introduction.


Steganography, Cryptography, LSB, JSteg , JMQT, DCT, PSNR


Almohammad and G. Ghinea 2015, “Image Steganography and Chrominance Components,”10th IEEE International Conference on Computer and Information Technology (CIT 2015).

J.G.Yu1, E.J.Yoon2, S.H. Shin1 and K.Y. Yoo 2015, “A New Image Steganography Based on 2k Correction and Edge-Detection”, Fifth International Conference on Information Technology: New Generations 978-0-7695-3099-4/08, April 2015.

G. Sahoo1 and R. K. Tiwari2 2015, “Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization,” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2015.

N. N. EL-Emam 2014, “Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm,” International Journal of Information and Communication Engineering, 4:2, 2014.

N.N. EL-Emam 2014, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm,” Journal of Computer Science, vol.3(4), pp. 223-232, 2014, ISSN 1549-3636.

L. M. Marvel, Member 2014, C. G. Boncelet and C. T. Retter, “Spread Spectrum Image Steganography,” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 8, AUGUST 2014.

J. He, S. Tang and TingtingWu 2014, “An Adaptive Image Steganography Based on Depth-varying Embedding,” Congress on Image and Signal Processing, vol.5, 2014, pp. 660-663, DOI 10.1109/CISP.2008.189

S .K. Moon, R.S. Kawitkar 2014, “Data Security using Data Hiding,” International Conference on Computational Intelligence and Multimedia Applications 2014.

S. M Thampi 2014, “Information Hiding Techniques: A Tutorial Review,” ISTE-STTP on Network Security & Cryptography, LBSCE 2014.

C.Y. Yang 2014, “Color Image Steganography Based on Module Substitutions,” Third International Conference on International Information Hiding and Multimedia Signal Processing Year of Publication: 2014 ISBN:0-7695-2994-1.

D.C. Lou and C.H. Sung 2013, “A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem,” IEEE Transactions on Multimedia, VOL. 6, NO. 3, JUNE 2013.

K. Curran, K. Bailey 2013, “An Evaluation of Image Based Steganography Methods,” International Journal of Digital Evidence Fall 2013, Volume 2, Issue 2.

J. Fridrich, M. Goljan 2012, Binghamton, “Practical Steganalysis of Digital Images – State of the Art,” Conference, San Jose CA, ETATS-UNIS (21/01/2012).

C.C. Chang, T.S. Chen, L.Z. Chung 2012, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, vol.141, pp. 123–138, 2012.

K. Rabah 2004, “Steganography-The Art of Hiding Data,” Information Technology, Journal, vol.3 (3), pp. 245-269, 2004, ISSN 1682-6027.

Author Details

Harender Singh

Manjeet Singh