Review on Steganography Methods in Multi-Media Domain


  • Roshidi Din
  • Massudi Mahmuddin
  • Alaa Jabbar Qasim





Information hiding, Image steganographic, Cover file, Embedding Data


Steganography is one area in information security that is able to conceal the secret message in any media to avoid the intruders. In this paper, the review of steganography is done in certain media such as image, text, audio, and video. It analyses some of the techniques that applied steganography to discover the development of the techniques to cover a secret message. It is expected that this paper is able to describe the implementation of steganography by previous researchers on their efforts.



[1] M. Kumar, "Steganography and steganalysis of joint picture expert group (JPEG) images," University of Florida, 2011.

[2] B. Li, J. He, J. Huang, and Y. Q. Shi, "A survey on image steganography and steganalysis," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, pp. 142-172, 2011.

[3] J. H. Bhavsar and I. Khan, "Techniques of Steganography and Steganalysis," Available at SSRN 2029407, 2012.

[4] Y. J. Chanu, K. M. Singh, and T. Tuithung, "Image steganography and steganalysis: A survey," International Journal of Computer Applications, vol. 52, 2012.

[5] K. Bailey and K. Curran, "An evaluation of image based steganography methods," Multimedia Tools and Applications, vol. 30, pp. 55-88, 2006.

[6] B. G. Banik and S. K. Bandyopadhyay, "Review on Steganography in Digital Media."

[7] R. Samagh and S. Rani, "Data Hiding using Image Steganography."

[8] R. J. Anderson and F. A. Petitcolas, "On the limits of steganography," IEEE Journal on selected areas in communications, vol. 16, pp. 474-481, 1998.

[9] N. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in Information Hiding, 1998, pp. 273-289.

[10] B. G. Banik and S. K. Bandyopadhyay, "Review on Steganography in Digital Media," 2015.

[11] R. Samagh and S. Rani, "Data Hiding using Image Steganography," 2015.

[12] N. Cvejic, Algorithms for audio watermarking and steganography: Oulun yliopisto, 2004.

[13] P. Jayaram, H. Ranganatha, and H. Anupama, "Information hiding using audio steganography–a survey," The International Journal of Multimedia & Its Applications (IJMA) Vol, vol. 3, pp. 86-96, 2011.

[14] N. Cvejic and T. Seppänen, "Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding," J. UCS, vol. 11, pp. 56-65, 2005.

[15] N. Cvejic and T. Seppanen, "Increasing robustness of LSB audio steganography using a novel embedding method," in Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on, 2004, pp. 533-537.

[16] C. Parthasarathy and S. Srivatsa, "Increased robustness of LSB audio steganography by reduced distortion LSB coding," Journal of Theoretical and Applied Information Technology, vol. 7, pp. 080-086, 2005.

[17] M. Nosrati, R. Karimi, and M. Hariri, "Audio steganography: a survey on recent approaches," world applied programming, vol. 2, pp. 202-205, 2012.

[18] S. Moon and R. Kawitkar, "Data security using data hiding," in Conference on computational intelligence and multimedia applications, 2007. International conference on, 2007, pp. 247-251.

[19] F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-a survey," Proceedings of the IEEE, vol. 87, pp. 1062-1078, 1999.

[20] V. M. Wajgade and D. S. Kumar, "Enhancing data security using video steganography," International Journal of Emerging Technology and Advanced Engineering, vol. 3, pp. 549-552, 2013.

[21] S. Bhattacharyya, "A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier," Journal of global research in computer science, vol. 2, 2011.

[22] A. Al-Frajat, H. Jalab, Z. Kasirun, A. Zaidan, and B. Zaidan, "Hiding data in video file: An overview," Journal of Applied Sciences(Faisalabad), vol. 10, pp. 1644-1649, 2010.

[23] O. G. Roshidi Din, Alaa Jabbar Qasim, "Analytical Review on Graphical Formats Used in Image Steganographic Compression," Indonesian Journal of Electrical Engineering and Computer Science, vol. Vol 12, No 2, p. pp. 441~446, November 2018.

[24] A. J. QASSIM and Y. SUDHAKAR, "Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm," 2015.

View Full Article: