SLGP Header

A Comparative Study on Pattern Based Image Steganography

IJCSEC Front Page

The speedy growth of the Internet and digitized contented made text/image delivery simpler. The capability to protect and secure information is dynamic to the growth of electronic trade and to the growth of the Internet itself. A safe data transmission over computer networks can be realized concluded steganography and cryptography. Steganography is a technique used to transmit a secret message from a source to a receiver in a way such that a probable intruder does not suspicious the being on the message. In steganography different-different carrier files can be used, but the most popular is digital images because they are used a proportion now a day on the internet. Steganography helps in the communication of secured data in numerous carries like images, videos and audio. In image steganography the information is hidden entirely in images. A comparative study on pattern based image steganography, one of the drawbacks of most of the current steganography methods is that it changes the bits used for storing color information. A comparative with different three methods of steganography, pixel pattern, 3D pattern, Dynamic pattern. In this Paper, means to give an overview of image steganography, its uses and techniques. It also endeavors to classify the requirements of a good steganography algorithm using pattern based and briefly reflects on which steganography techniques are more suitable for this pattern based steganography.
Keywords:Cover Image,DPIS,Data Protection,Steganography, Pixel, 3D steganography, LSB.


  1. Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioum, Abdulrahman Shaheen and Aleem Alvi, “Pixel Indicator High Capacity Technique For Rgb Image Based Steganography, WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah,U.A.E 18- 20 March 2008
  2. Anderson RJ, and Petitcolas FAP, “On Limits Of Steganography”, IEEE Journals of selected areas in communications, May 1998
  3. Andreas Westfeld , Andreas Pfitzmann, Attacks On Steganographic Systems, Proceedings of the Third International Workshop on Information Hiding, p.61-76, September 29-October 01, 1999
  4. Artz D, “Digital Steganography: Hiding Data Within Data”. IEEE Internet Computing: Spotlight pages 75-80 May-June 2001
  5. Bailey K, Curran K. “An Evaluation of Image Based Steganography Methods” Multimedia Tools & Applications, Vol.30.No.1.pages 55-88 July 2006
  6. Krenn R, “Steganography and Steganalysis”,
  7. Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub, "RGB Intensity Based Variable-Bits Image Steganography," apscc, pp.1322-1327, 2008 IEEE Asia-Pacific Services Computing Conference, 2008
  8. Morkel T, Eloff JHP, Olivier MS , “An Overview Of Image Steganography” , in Proceedings of fifth Annual Information Security South Africa Conference ISSA 2005
  9. Provos N, Honeyman P, Hide And Seek: An Introduction To Steganography, IEEE Security & Privacy Magazine 1 (2003) pp. 32-44
  10. Silman J, “Steganography and Steganalysis : An Overview” , SANS Institute , 2001
  11. Namita Tiwari and Madhu Shandilya, “Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An Incremental Growth”, International Journal of Security and Its Applications, Vol. 4, No. 4, pp. 53-62, 2010.
  12. Koyi Lakshmi Prasad and T. Ch. Malleswara Rao, “A Novel Secured RGB LSB Steganography with Enhanced Stego-Image Quality”, International Journal of Engineering Research and Applications, Vol. 3, No. 6, pp. 1299-1303, 2013.
  13. Mamta Juneja and Parvinder S. Sandhu, “An Improved LSB based Steganography Technique for RGB Color Images”, 2nd International Conference on Latest Computational Technologies, pp. 10-14, 2013.
  14. Mohammad Tanvir Parvez and Adnan Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits Image Steganography”, IEEE Asia-Pacific Services Computing Conference, pp. 1322-1327, 2008.
  15. Babita and Ayushi, “Secure Image Steganography Algorithm using RGB Image Format and Encryption Technique”, International Journal of Computer Science and Engineering Technology, Vol. 4, No. 6, pp. 758-762 , 2013.
  16. Adnan Abdul-Aziz Gutub, “Pixel Indicator Technique for RGB Image Steganography”, Available at
  17. Hassan Mathkourand, B. Al-Sadoon and Ameur Touir, “A New Image Steganography Technique”, IEEE 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2008.