A review of steganographic methods and techniques
The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video,...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Kulliyah of Information and Communication Technology, International Islamic University Malaysia
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf http://irep.iium.edu.my/64307/ http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/56 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.64307 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.64307 http://irep.iium.edu.my/64307/ A review of steganographic methods and techniques Beroual, Abdessalam Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded information. Many challenges confront steganography systems like capacity (size of data embedded) and imperceptibility (level of undetectability). These two aspects are inversely proportional to each other which produces a data hiding dilemma. This paper presents a review of the steganography methods used in recent years and a critical analysis based mainly on capacity measurement and, secondly, on imperceptibility measurement and steganography domain. Kulliyah of Information and Communication Technology, International Islamic University Malaysia 2018-06-08 Article PeerReviewed application/pdf en http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf Beroual, Abdessalam and Alshaikhli, Imad Fakhri Taha (2018) A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 4 (1). pp. 1-6. http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/56 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Beroual, Abdessalam Alshaikhli, Imad Fakhri Taha A review of steganographic methods and techniques |
description |
The frequent and intensive transmission of information on the internet
requires protection techniques to secure sensitive information. Steganography is one of
many security techniques that consist of concealing information inside an appropriate
multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded
information. Many challenges confront steganography systems like capacity (size of data
embedded) and imperceptibility (level of undetectability). These two aspects are
inversely proportional to each other which produces a data hiding dilemma. This paper
presents a review of the steganography methods used in recent years and a critical
analysis based mainly on capacity measurement and, secondly, on imperceptibility
measurement and steganography domain. |
format |
Article |
author |
Beroual, Abdessalam Alshaikhli, Imad Fakhri Taha |
author_facet |
Beroual, Abdessalam Alshaikhli, Imad Fakhri Taha |
author_sort |
Beroual, Abdessalam |
title |
A review of steganographic methods and techniques |
title_short |
A review of steganographic methods and techniques |
title_full |
A review of steganographic methods and techniques |
title_fullStr |
A review of steganographic methods and techniques |
title_full_unstemmed |
A review of steganographic methods and techniques |
title_sort |
review of steganographic methods and techniques |
publisher |
Kulliyah of Information and Communication Technology, International Islamic University Malaysia |
publishDate |
2018 |
url |
http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf http://irep.iium.edu.my/64307/ http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/56 |
_version_ |
1643617222017417216 |
score |
13.211869 |