A Review on Image Steganography Techniques

Avantika Bisht, Annu Singla, Kamaldeep Joshi
{"title":"A Review on Image Steganography Techniques","authors":"Avantika Bisht, Annu Singla, Kamaldeep Joshi","doi":"10.47392/irjaeh.2024.0271","DOIUrl":null,"url":null,"abstract":"In contemporary times, the exploration of digital multimedia has transformed it into a reliable medium for secure communication. Steganography, the art of concealed communication through mediums like images, has emerged as a pivotal approach, countered by the opposing method of steganalysis for detecting embedded data. This review delves into diverse methodologies examined by researchers, elucidating the primary objective of image steganography—to safeguard data messages from illicit access. The essence lies in discreetly transferring embedded secure data to the target destination without detection by unauthorized users. While various carrier file formats can be employed, digital images, owing to their widespread use on the global Internet, become the preferred medium. The realm of steganographic methodologies encompasses a broad spectrum, varying in complexity, each with its distinct strengths and weaknesses. This exploration underscores the dynamic landscape of image steganography, affirming the ongoing pursuit of effective methods to protect information from unauthorized access through covert channels. The review article provides an overview of various methodologies employed by researchers in the field of image steganography. It emphasizes the significance of using digital images as carrier files due to their prevalence on the worldwide Internet. The content acknowledges the complexity of steganographic methods and highlights that each method has its own strengths and weaknesses. Overall, the discussion underscores the importance of exploring and analyzing these methodologies to enhance the effectiveness of image steganography in secure communication.","PeriodicalId":517766,"journal":{"name":"International Research Journal on Advanced Engineering Hub (IRJAEH)","volume":"44 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Research Journal on Advanced Engineering Hub (IRJAEH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47392/irjaeh.2024.0271","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In contemporary times, the exploration of digital multimedia has transformed it into a reliable medium for secure communication. Steganography, the art of concealed communication through mediums like images, has emerged as a pivotal approach, countered by the opposing method of steganalysis for detecting embedded data. This review delves into diverse methodologies examined by researchers, elucidating the primary objective of image steganography—to safeguard data messages from illicit access. The essence lies in discreetly transferring embedded secure data to the target destination without detection by unauthorized users. While various carrier file formats can be employed, digital images, owing to their widespread use on the global Internet, become the preferred medium. The realm of steganographic methodologies encompasses a broad spectrum, varying in complexity, each with its distinct strengths and weaknesses. This exploration underscores the dynamic landscape of image steganography, affirming the ongoing pursuit of effective methods to protect information from unauthorized access through covert channels. The review article provides an overview of various methodologies employed by researchers in the field of image steganography. It emphasizes the significance of using digital images as carrier files due to their prevalence on the worldwide Internet. The content acknowledges the complexity of steganographic methods and highlights that each method has its own strengths and weaknesses. Overall, the discussion underscores the importance of exploring and analyzing these methodologies to enhance the effectiveness of image steganography in secure communication.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
图像隐写术技术综述
在当代,对数字多媒体的探索已将其转化为安全通信的可靠媒介。隐写术是一种通过图像等媒介进行隐蔽通信的艺术,它已成为一种重要的方法,与之相对的是用于检测嵌入数据的隐写分析方法。这篇综述深入探讨了研究人员所研究的各种方法,阐明了图像隐写术的主要目标--保护数据信息不被非法获取。其本质在于将嵌入的安全数据隐秘地传输到目标目的地,而不被未经授权的用户发现。虽然可以使用各种载体文件格式,但由于数字图像在全球互联网上的广泛使用,数字图像已成为首选媒介。隐写方法的范围很广,复杂程度各不相同,各有优缺点。这一探索强调了图像隐写术的动态发展,肯定了人们对有效方法的不断追求,以保护信息不被未经授权的渠道获取。这篇综述文章概述了图像隐写术领域研究人员采用的各种方法。文章强调了使用数字图像作为载体文件的重要性,因为数字图像在全球互联网上非常普遍。文章内容承认隐写方法的复杂性,并强调每种方法都有自己的优缺点。总之,讨论强调了探索和分析这些方法的重要性,以提高图像隐写术在安全通信中的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Dynamic Load Balancing in Cloud Computing: Improving Efficiency and Performance in Real Life Applications Optimizing Renewable Energy Integration in Green Building Projects: Addressing Barriers and Enhancing Energy Performance Drone Technology in Construction Industry Addressing Workplace Harassment and Discrimination: Strategies for Creating Inclusive Environments in Construction Engineering Smart Plant Health Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1