{"title":"图像隐写技术综述","authors":"R. Ruchi, U. Ghanekar","doi":"10.2139/ssrn.3579269","DOIUrl":null,"url":null,"abstract":"This paper presents an overview of image steganography techniques. In the present paper, the main emphasis is given on transform domain techniques including a brief introduction on spatial domain techniques as well. The major advantage with transform domain technique is that the data is concealed in every bit of cover image and almost impossible for an intruder to get unauthorized access to it. The study analyzes different transforms based techniques including many variants of Wavelet Transform with its advantages, challenges and applications.","PeriodicalId":433297,"journal":{"name":"EngRN: Signal Processing (Topic)","volume":"209 10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Brief Review on Image Steganography Techniques\",\"authors\":\"R. Ruchi, U. Ghanekar\",\"doi\":\"10.2139/ssrn.3579269\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an overview of image steganography techniques. In the present paper, the main emphasis is given on transform domain techniques including a brief introduction on spatial domain techniques as well. The major advantage with transform domain technique is that the data is concealed in every bit of cover image and almost impossible for an intruder to get unauthorized access to it. The study analyzes different transforms based techniques including many variants of Wavelet Transform with its advantages, challenges and applications.\",\"PeriodicalId\":433297,\"journal\":{\"name\":\"EngRN: Signal Processing (Topic)\",\"volume\":\"209 10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EngRN: Signal Processing (Topic)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3579269\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EngRN: Signal Processing (Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3579269","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper presents an overview of image steganography techniques. In the present paper, the main emphasis is given on transform domain techniques including a brief introduction on spatial domain techniques as well. The major advantage with transform domain technique is that the data is concealed in every bit of cover image and almost impossible for an intruder to get unauthorized access to it. The study analyzes different transforms based techniques including many variants of Wavelet Transform with its advantages, challenges and applications.