Digital image steganography: Survey and analysis of current methods
نویسندگان
چکیده
منابع مشابه
Digital image steganography: Survey and analysis of current methods
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other science...
متن کاملAnalysis of Image Steganography Techniques: A Survey
Steganography is the technique of hiding data in an appropriate multimedia carrier, e. g. , image, audio, and video files known as Cover. Images are mostly used as the cover medium due to their pervasiveness in different applications and representation with high redundancy. This paper provides a review and analysis of many existing methods for digital image steganography in the spatial as well ...
متن کاملA Survey on Digital Image Steganography and Steganalysis
Steganography is an information security approach used to hide messages inside suitable covers in such a way that it is not known to attackers. The cover files may be any digital data including Image or Audio files. For steganography several methods exists where each of them has some advantages and disadvantages. Steganographic applications have varying requirements depending upon the steganogr...
متن کاملCurrent status and key issues in image steganography: A survey
Steganography and steganalysis are the prominent research fields in information hiding paradigm. Steganography is the science of invisible communication while steganalysis is the detection of steganography. Steganography means “covered writing” that hides the existence of the message itself. Digital steganography provides potential for private and secure communication that has become the necess...
متن کاملA Survey on Digital Image Steganographic Methods
Many approaches and techniques are available in the literature for information hiding. Figure 1 shows a generic embedding and extracting scheme. The inputs to the embedding scheme are the hiding message, the cover data and an optional public or secret key K. The output is stego data, also called stego object. Inputs to the generic extracting scheme are the tested data, the secret or public key,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Signal Processing
سال: 2010
ISSN: 0165-1684
DOI: 10.1016/j.sigpro.2009.08.010