Image Steganography: Recent Trends and Techniques

Image Steganography: Recent Trends and Techniques

Sana Parveen K, Renjith V. Ravi, Basma Abd El-Rahiem, Mangesh M. Ghonge
Copyright: © 2021 |Pages: 21
ISBN13: 9781799871606|ISBN10: 1799871606|ISBN13 Softcover: 9781799871613|EISBN13: 9781799871620
DOI: 10.4018/978-1-7998-7160-6.ch002
Cite Chapter Cite Chapter

MLA

Parveen K, Sana, et al. "Image Steganography: Recent Trends and Techniques." Multidisciplinary Approach to Modern Digital Steganography, edited by Sabyasachi Pramanik, et al., IGI Global, 2021, pp. 29-49. https://doi.org/10.4018/978-1-7998-7160-6.ch002

APA

Parveen K, S., Ravi, R. V., Abd El-Rahiem, B., & Ghonge, M. M. (2021). Image Steganography: Recent Trends and Techniques. In S. Pramanik, M. Ghonge, R. Ravi, & K. Cengiz (Eds.), Multidisciplinary Approach to Modern Digital Steganography (pp. 29-49). IGI Global. https://doi.org/10.4018/978-1-7998-7160-6.ch002

Chicago

Parveen K, Sana, et al. "Image Steganography: Recent Trends and Techniques." In Multidisciplinary Approach to Modern Digital Steganography, edited by Sabyasachi Pramanik, et al., 29-49. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-7160-6.ch002

Export Reference

Mendeley
Favorite

Abstract

Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties. As data is unknown, it is challenging to attract the attention of any third parties. Therefore, steganography becomes the best and most secure method for data transmission. Digital images are the most common cover media or carriers in steganographic processes, where the secret payload is embedded into images. Several techniques are coming under image steganography, and there includes a different method to ensure the secrecy of messages. This chapter gives an overview of the different commonly used techniques in this area and the latest existing image steganography methods and the comparison of techniques.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.