2019
DOI: 10.11591/eei.v8i4.1626
|View full text |Cite
|
Sign up to set email alerts
|

Steganography analysis techniques applied to audio and image files

Abstract: The present work carries out a descriptive analysis of the main steganography techniques used in specific digital media such as audio and image files. For this purpose, a literary review of the domains, methods, and techniques as part of this set was carried out and their functioning, qualities, and weaknesses are identified. Hence, it is concluded that there is a wide relationship between audio and image steganography techniques in their implementation form. Nevertheless, it is determined that LSB is one of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
26
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(26 citation statements)
references
References 7 publications
0
26
0
Order By: Relevance
“…For the coding of a set of images, using this technique, the table can be dynamically constructed. Also, techniques such as clustering can be used to perform vector classification [12,38,39].  Fractal compression A fractal is a semi-geometric object whose basic structure, fragmented or irregular, is repeated at different scales; for example, clouds, mountains, the circulatory system, coastal lines, or snowflakes are natural fractals; many images are like these objects.…”
Section:  Transformation Codingmentioning
confidence: 99%
See 1 more Smart Citation
“…For the coding of a set of images, using this technique, the table can be dynamically constructed. Also, techniques such as clustering can be used to perform vector classification [12,38,39].  Fractal compression A fractal is a semi-geometric object whose basic structure, fragmented or irregular, is repeated at different scales; for example, clouds, mountains, the circulatory system, coastal lines, or snowflakes are natural fractals; many images are like these objects.…”
Section:  Transformation Codingmentioning
confidence: 99%
“…The application of fractal techniques for the compression of digital images was introduced by Michael Barnsley and Arnaud Jacquin in 1988. Jacquin proposed to consider the images as a collection of related transformations of small image domains, while Barnsley suggests that images be stored as a collection of transforms, whose number determines the compression rate [12,38,39].…”
Section:  Transformation Codingmentioning
confidence: 99%
“…It is also a sub-discipline of information hiding. It is often mistaken for Cryptography, even though both are used to protect valuable information [2]. The difference between them is that steganography is the study of hiding information to conceal its existence, while Cryptography is the art of cryptogram or secret writing, involving various methods or embedded technique to ensure the protection of message contents [3].…”
Section: Introductionmentioning
confidence: 99%
“…Development of the computer and information technology is a new impetus for the development of computer cryptography and steganography [1,2]. Many new applications have emerged and as technology improved, most people began to use the internet for sharing information.…”
Section: Introductionmentioning
confidence: 99%
“…This information may be any format of multimedia with multiple sizes. Such information about military, banking and many government organizations are strictly confidential, while sending this information online is not always safe [2,3]. Cryptography and steganography techniques are important tools to provide security and protect sensitive information.…”
Section: Introductionmentioning
confidence: 99%