z-logo
open-access-imgOpen Access
A Review of Steganographic Methods and Techniques
Author(s) -
Abdessalam Beroual,
Imad Fakhri Taha Alshaikhli
Publication year - 2018
Publication title -
international journal on perceptive and cognitive computing
Language(s) - English
Resource type - Journals
ISSN - 2462-229X
DOI - 10.31436/ijpcc.v4i1.56
Subject(s) - steganography , computer science , information hiding , steganography tools , the internet , computer security , information security , dilemma , transmission (telecommunications) , image (mathematics) , multimedia , data mining , artificial intelligence , telecommunications , world wide web , mathematics , geometry
The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded information. Many challenges confront steganography systems like capacity (size of data embedded) and imperceptibility (level of undetectability). These two aspects are inversely proportional to each other which produces a data hiding dilemma. This paper presents a review of the steganography methods used in recent years and a critical analysis based mainly on capacity measurement and, secondly, on imperceptibility measurement and steganography domain.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here