2021
DOI: 10.9734/ajrcos/2021/v10i330243
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Transfer over Internet Using Image Steganography: Review

Abstract: Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…However, when the hidden data is discovered, steganography becomes a problem (Saleh et al, 2016). Image steganography should be robust, have good visual quality, and be secure (Okediran, 2020;Abdullah, 2021). Overall, steganography is a useful technique for keeping data private but its effectiveness depends on its ability to maintain imperceptibility and robustness while avoiding detection (Abd-El-Atty, 2023).…”
Section: Introductionmentioning
confidence: 99%
“…However, when the hidden data is discovered, steganography becomes a problem (Saleh et al, 2016). Image steganography should be robust, have good visual quality, and be secure (Okediran, 2020;Abdullah, 2021). Overall, steganography is a useful technique for keeping data private but its effectiveness depends on its ability to maintain imperceptibility and robustness while avoiding detection (Abd-El-Atty, 2023).…”
Section: Introductionmentioning
confidence: 99%
“…Thus, it is essential to enhance appropriate methodologies to safeguard medical quantum images in healthcare applications. Securing digital images can be accomplished by taking advantage of image steganography [16][17][18], image watermarking [19][20][21], and image encryption [22][23][24][25]. Encryption is the optimal technique for guaranteeing the security of medical images.…”
Section: Introductionmentioning
confidence: 99%
“…Digital data provide a comfortable environment for editing and modifying the data that can be copied without losing data quality and content. The computer-processed digital data can be delivered from one device to another without any errors or external interference [5]. However, digital data distribution poses serious concern due to attacks or manipulation by unauthorized users, which leads to the loss of relevance, thus weakening its security aspect.…”
Section: Introductionmentioning
confidence: 99%