Due to the importance, security, confidentiality, privacy, and progress of information at present due to the development in the field of information technology, sharing this information (text, image, audio, video) has become a critical problem due to the exposure of this information to penetration by attacking parties, and to solve the problem of penetration, many technologies have appeared to protect This information (text, image, audio, video) is cryptography algorithms and information steganography techniques. Steganography is a science that maintains the confidentiality of information (text, image, audio, video) between two communicating parties (the sender and the receiver), and it is a science that studies the invisible communication of information. In this paper, the researcher reviewed the most important techniques of previous studies for the last six years, such as LSB, PVD, DFT, DWT, DCT, Masking & Filtering, Distortion, and Statistical. In the science of hiding information, and analyzing it in terms of technical domain, invisibility, capacity, and complexity, all of these techniques can hide this information from hostile attacks. In this paper, the evaluation criteria for hiding the information (text, image, audio, video) were reviewed in terms of imperceptibility, robustness, capacity, and security. Also, the most important applications of hiding techniques (text, image, audio, video) were reviewed in this paper.
Skip Nav Destination
Article navigation
16 February 2024
3RD INTERNATIONAL CONFERENCE ON ENGINEERING AND SCIENCE
3–4 May 2023
Al-Samawa, Iraq
Research Article|
February 16 2024
A review of steganography techniques
Ali Mahmood Khalaf;
Ali Mahmood Khalaf
a)
Department of Computer Science, Gujarat University
, Ahmadabad, Gujarat, India
.a)Corresponding author: [email protected]
Search for other works by this author on:
Kamaljit Lakhtaria
Kamaljit Lakhtaria
b)
Department of Computer Science, Gujarat University
, Ahmadabad, Gujarat, India
.
Search for other works by this author on:
a)Corresponding author: [email protected]
AIP Conf. Proc. 3051, 040005 (2024)
Citation
Ali Mahmood Khalaf, Kamaljit Lakhtaria; A review of steganography techniques. AIP Conf. Proc. 16 February 2024; 3051 (1): 040005. https://doi.org/10.1063/5.0191705
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
Citing articles via
Design of a 100 MW solar power plant on wetland in Bangladesh
Apu Kowsar, Sumon Chandra Debnath, et al.
Inkjet- and flextrail-printing of silicon polymer-based inks for local passivating contacts
Zohreh Kiaee, Andreas Lösel, et al.
Production and characterization of corncob biochar for agricultural use
Praphatsorn Rattanaphaiboon, Nigran Homdoung, et al.
Related Content
Hybrid video steganography and cryptography techniques: Review paper
AIP Conf. Proc. (October 2024)
A systematic literature review on combined framework of secure communication using steganography and cryptography
AIP Conf. Proc. (November 2023)
Review of secure the online multimedia data using chaotic map and steganography techniques
AIP Conference Proceedings (October 2021)
Enhancing security in public cloud using novel cryptography and enhanced steganography with E-Lsb encoding comparing with traditional steganography
AIP Conf. Proc. (May 2023)
A novel block based compression scheme for data hiding using lossless steganography
AIP Conf. Proc. (June 2023)