A Comprehensive Study of Image Steganography Techniques
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.6, No. 5)Publication Date: 2017-11-25
Authors : Israa T. Ali Shaymaa Jawad;
Page : 101-104
Keywords : ;
Abstract
Abstract:Transmitting images confidentially from sender to an authorized receiver through an insecure (public) channel is a challenging task. Therefore, several methods are developed to protect important information for safe and secure communication. There are three main technologies used for securing digital data: watermarking, steganography and cryptography. Steganography and watermarking could be considered within the same field (information hiding). This paper presents a comprehensive study for various methodologies in the field of image steganography. Each methodology has its bad and good points, therefore, a part of advantages and drawbacks are also discussed as a comparative study to help future researchers by providing a review of the existing techniques. Keywords: image steganography, spatial domain, transform domain, cover image, and stego image
Other Latest Articles
- A special Tree based index structure for efficient data searching in cloud data
- CYBER CRIME: PHISHING ATTACKS AND VARIOUS ANTI-PHISHING TECHNIQUES
- Energy-Aware Robust Key Management Technique for Dynamic Wireless Sensor Networks
- A Prototype Implementation for Public Key Infrastructure Based on Transport Layer Security
- Empirical Analysis of Open Source projects using Feature Selection and Filtering Techniques
Last modified: 2017-11-25 17:54:31