2015
DOI: 10.5120/19165-0620
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Various Approaches of Image Steganography

Abstract: Steganography is an art of concealing the fact with the purpose of communication, by hiding one information in other information. In steganography, many different carrier file formats are used now days, but the digital images are most popular for hiding information because of their frequency on Internet. There is a large variety of techniques of steganography are available for hiding secret information into images. Each of them has its strong & weak points. Choice of which steganography technique is used it de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Image processing is a common type of image processing. Image processing techniques include enhancement, encoding, restoration and compression [18].…”
Section: Digital Image Processingmentioning
confidence: 99%
“…Image processing is a common type of image processing. Image processing techniques include enhancement, encoding, restoration and compression [18].…”
Section: Digital Image Processingmentioning
confidence: 99%
“…Several studies have investigated the various Steganography image approaches utilized to conceal messages in concealment objects [24][25][26][27]. The critical problem of communication concealing methods is to embed the most significant volume of communication in the cover object while maintaining consistency, including the reliability and power of the system in challenging hackers with electronic attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden [6].…”
Section: Introductionmentioning
confidence: 99%