A review of steganographic methods and techniques

The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video,...

Full description

Saved in:
Bibliographic Details
Main Authors: Beroual, Abdessalam, Alshaikhli, Imad Fakhri Taha
Format: Article
Language:English
Published: Kulliyah of Information and Communication Technology, International Islamic University Malaysia 2018
Subjects:
Online Access:http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf
http://irep.iium.edu.my/64307/
http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/56
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.64307
record_format dspace
spelling my.iium.irep.64307 http://irep.iium.edu.my/64307/ A review of steganographic methods and techniques Beroual, Abdessalam Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded information. Many challenges confront steganography systems like capacity (size of data embedded) and imperceptibility (level of undetectability). These two aspects are inversely proportional to each other which produces a data hiding dilemma. This paper presents a review of the steganography methods used in recent years and a critical analysis based mainly on capacity measurement and, secondly, on imperceptibility measurement and steganography domain. Kulliyah of Information and Communication Technology, International Islamic University Malaysia 2018-06-08 Article PeerReviewed application/pdf en http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf Beroual, Abdessalam and Alshaikhli, Imad Fakhri Taha (2018) A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 4 (1). pp. 1-6. http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/56
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Beroual, Abdessalam
Alshaikhli, Imad Fakhri Taha
A review of steganographic methods and techniques
description The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded information. Many challenges confront steganography systems like capacity (size of data embedded) and imperceptibility (level of undetectability). These two aspects are inversely proportional to each other which produces a data hiding dilemma. This paper presents a review of the steganography methods used in recent years and a critical analysis based mainly on capacity measurement and, secondly, on imperceptibility measurement and steganography domain.
format Article
author Beroual, Abdessalam
Alshaikhli, Imad Fakhri Taha
author_facet Beroual, Abdessalam
Alshaikhli, Imad Fakhri Taha
author_sort Beroual, Abdessalam
title A review of steganographic methods and techniques
title_short A review of steganographic methods and techniques
title_full A review of steganographic methods and techniques
title_fullStr A review of steganographic methods and techniques
title_full_unstemmed A review of steganographic methods and techniques
title_sort review of steganographic methods and techniques
publisher Kulliyah of Information and Communication Technology, International Islamic University Malaysia
publishDate 2018
url http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf
http://irep.iium.edu.my/64307/
http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/56
_version_ 1643617222017417216
score 13.211869