A Review on Image Steganography Techniques

Authors

  • Avantika Bisht M.Tech. student, CSE, UIET, M.D. University, Rohtak, India. Author
  • Annu Singla M.Tech. student, CSE, UIET, M.D. University, Rohtak, India. Author
  • Kamaldeep Joshi Assistant Professor, CSE, UIET, M.D. University, Rohtak, India. Author

DOI:

https://doi.org/10.47392/IRJAEH.2024.0271

Keywords:

Steganographic Scheme, Steganalysis, Image Processing, Image Enhancement, Image Steganography, Stego image, Cover image

Abstract

In contemporary times, the exploration of digital multimedia has transformed it into a reliable medium for secure communication. Steganography, the art of concealed communication through mediums like images, has emerged as a pivotal approach, countered by the opposing method of steganalysis for detecting embedded data. This review delves into diverse methodologies examined by researchers, elucidating the primary objective of image steganography—to safeguard data messages from illicit access. The essence lies in discreetly transferring embedded secure data to the target destination without detection by unauthorized users. While various carrier file formats can be employed, digital images, owing to their widespread use on the global Internet, become the preferred medium. The realm of steganographic methodologies encompasses a broad spectrum, varying in complexity, each with its distinct strengths and weaknesses. This exploration underscores the dynamic landscape of image steganography, affirming the ongoing pursuit of effective methods to protect information from unauthorized access through covert channels. The review article provides an overview of various methodologies employed by researchers in the field of image steganography. It emphasizes the significance of using digital images as carrier files due to their prevalence on the worldwide Internet. The content acknowledges the complexity of steganographic methods and highlights that each method has its own strengths and weaknesses. Overall, the discussion underscores the importance of exploring and analyzing these methodologies to enhance the effectiveness of image steganography in secure communication.

Downloads

Download data is not yet available.

Downloads

Published

2024-07-15

How to Cite

A Review on Image Steganography Techniques. (2024). International Research Journal on Advanced Engineering Hub (IRJAEH), 2(07), 1986-1996. https://doi.org/10.47392/IRJAEH.2024.0271

Similar Articles

41-50 of 79

You may also start an advanced similarity search for this article.