SLGP Header

A Comparative Study on Pattern Based Image Steganography

IJCSEC Front Page

The speedy growth of the Internet and digitized contented made text/image delivery simpler. The capability to protect and secure information is dynamic to the growth of electronic trade and to the growth of the Internet itself. A safe data transmission over computer networks can be realized concluded steganography and cryptography. Steganography is a technique used to transmit a secret message from a source to a receiver in a way such that a probable intruder does not suspicious the being on the message. In steganography different-different carrier files can be used, but the most popular is digital images because they are used a proportion now a day on the internet. Steganography helps in the communication of secured data in numerous carries like images, videos and audio. In image steganography the information is hidden entirely in images. A comparative study on pattern based image steganography, one of the drawbacks of most of the current steganography methods is that it changes the bits used for storing color information. A comparative with different three methods of steganography, pixel pattern, 3D pattern, Dynamic pattern. [1,10]In this Paper, means to give an overview of image steganography, its uses and techniques. It also endeavors to classify the requirements of a good steganography algorithm using pattern based and briefly reflects on which steganography techniques are more suitable for this pattern based steganography.

Keywords:Steganography, DPIS, pixel, 3D steganography, Data Protection, LSB, Cover Image


  1. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioum, Abdulrahman Shaheen and Aleem Alvi, “Pixel Indicator High Capacity Technique For RGB Image Based Steganography, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah,U.A.E 18- 20 March 2008
  2. Anderson RJ, and Petitcolas FAP, “On Limits Of Steganography”, IEEE Journals of selected areas in communications, May 1998
  3. Andreas Westfeld , Andreas Pfitzmann, Attacks On Steganographic Systems, Proceedings of the Third International Workshop on Information Hiding, p.61-76, September 29-October 01, 1999
  4. Bailey K, Curran K. “An Evaluation of Image Based Steganography Methods” Multimedia Tools & Applications, Vol.30.No.1.pages 55-88 July 2006
  5. Krenn R, “Steganography and Steganalysis”,
  6. Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub, "RGB Intensity Based Variable-Bits Image Steganography," apscc, pp.1322-1327, 2008 IEEE asia-Pacific Services Computing Conference, 2008