Open Access iconOpen Access

REVIEW

Randomization Strategies in Image Steganography Techniques: A Review

AFM Zainul Abadin1,2,*, Rossilawati Sulaiman1, Mohammad Kamrul Hasan1

1 Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM) Bangi, Selangor, 43600, Malaysia
2 Department of Information and Communication Engineering, Pabna University of Science and Technology, Pabna, 6600, Bangladesh

* Corresponding Author: AFM Zainul Abadin. Email: email

Computers, Materials & Continua 2024, 80(2), 3139-3171. https://doi.org/10.32604/cmc.2024.050834

Abstract

Image steganography is one of the prominent technologies in data hiding standards. Steganographic system performance mostly depends on the embedding strategy. Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image. The randomization strategies in data embedding techniques may utilize random domains, pixels, or region-of-interest for concealing secrets into a cover image, preventing information from being discovered by an attacker. The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility, but it is challenging. A systematic approach is used with a standard methodology to carry out this study. This review concentrates on the critical examination of several embedding strategies, incorporating experimental results with state-of-the-art methods emphasizing the robustness, security, payload capacity, and visual quality metrics of the stego images. The fundamental ideas of steganography are presented in this work, along with a unique viewpoint that sets it apart from previous works by highlighting research gaps, important problems, and difficulties. Additionally, it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.

Keywords


Cite This Article

APA Style
Abadin, A.Z., Sulaiman, R., Hasan, M.K. (2024). Randomization strategies in image steganography techniques: A review. Computers, Materials & Continua, 80(2), 3139-3171. https://doi.org/10.32604/cmc.2024.050834
Vancouver Style
Abadin AZ, Sulaiman R, Hasan MK. Randomization strategies in image steganography techniques: A review. Comput Mater Contin. 2024;80(2):3139-3171 https://doi.org/10.32604/cmc.2024.050834
IEEE Style
A.Z. Abadin, R. Sulaiman, and M.K. Hasan "Randomization Strategies in Image Steganography Techniques: A Review," Comput. Mater. Contin., vol. 80, no. 2, pp. 3139-3171. 2024. https://doi.org/10.32604/cmc.2024.050834



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 571

    View

  • 175

    Download

  • 0

    Like

Share Link