Due to the importance, security, confidentiality, privacy, and progress of information at present due to the development in the field of information technology, sharing this information (text, image, audio, video) has become a critical problem due to the exposure of this information to penetration by attacking parties, and to solve the problem of penetration, many technologies have appeared to protect This information (text, image, audio, video) is cryptography algorithms and information steganography techniques. Steganography is a science that maintains the confidentiality of information (text, image, audio, video) between two communicating parties (the sender and the receiver), and it is a science that studies the invisible communication of information. In this paper, the researcher reviewed the most important techniques of previous studies for the last six years, such as LSB, PVD, DFT, DWT, DCT, Masking & Filtering, Distortion, and Statistical. In the science of hiding information, and analyzing it in terms of technical domain, invisibility, capacity, and complexity, all of these techniques can hide this information from hostile attacks. In this paper, the evaluation criteria for hiding the information (text, image, audio, video) were reviewed in terms of imperceptibility, robustness, capacity, and security. Also, the most important applications of hiding techniques (text, image, audio, video) were reviewed in this paper.

1.
Kour
,
Jasleen
, and
Deepankar
Verma
. "
Steganography techniques–A review paper
."
International Journal of Emerging Research in Management & Technology
3
.
5
(
2014
):
132
135
.
2.
N.-I.
Wu
,
M.-S.
Hwang
,
Data hiding: Current status and key issues
,
Int. J. Netw. Secur.
4
(
2007
)
1
9
.
3.
Ghebleh
,
M.
, and
A.
Kanso
. "
A robust chaotic algorithm for digital image steganography
."
Communications in Nonlinear Science and Numerical Simulation
19
.
6
(
2014
):
1898
1907
.
4.
Hashim
,
Mohammed Mahdi
,
Mohd
Rahim
,
Mohd
Shafry
. "
Image Steganography Based On Odd/Even Pixels Distribution Scheme And Two Parameters Random Function
."
Journal of Theoretical & Applied Information Technology
95
.
19
(
2017
).
5.
Uhl
,
Andreas
, and
Andreas
Pommer
. "
Application scenarios for the encryption of still visual data
."
Image and video encryption from Digital Rights Management to secured personal communication, Advances in Information Security
15
(
2005
):
31
43
.
6.
Yadav
,
Virendra
Kumar
, and
Saumya
Batham
. "
A novel approach of bulk data hiding using text steganography
."
Procedia Computer Science
57
(
2015
):
1401
1410
.
7.
Iyer
,
S. S.
, and
Kamaljit
Lakhtaria
. "
New robust and secure alphabet pairing text steganography algorithm
."
International Journal of Current Trends in Engineering & Research (IJCTER)
2
.
7
(
2016
):
15
21
.
8.
Krishnan
,
S.
, and
M. S.
Abdullah
. "
Enhanced security audio steganography by using higher least significant bit
."
J Adv Res Comput Appl ISSN (online)
2
.
1
(
2016
):
39
54
.
9.
Rajkumar
,
Gat
Pooja
, and
V. S.
Malemath
. "
Video Steganography: Secure Data Hiding Technique
."
International Journal of Computer Network & Information Security
9
.
9
(
2017
).
10.
Al-Juaid
,
Nouf
A.
,
Adnan A.
Gutub
, and
Esam A.
Khan
. "
Enhancing PC data security via combining RSA cryptography and video based steganography
."
Journal of Information Security and Cybercrimes Research
1
.
1
(
2018
):
5
13
.
11.
Bandi
,
Siddalingesh
, and
H.S. Manjunatha
Reddy
. "
Combined audio steganography and AES encryption to hide the text and image into audio using DCT
."
Int. J. Recent Technol. Eng
8
.
3
(
2019
):
1732
1738
.
12.
Al-Juaid
,
Nouf
, and
Adnan
Gutub
. "
Combining RSA and audio steganography on personal computers for enhancing security
."
SN Applied Sciences
1
.
8
(
2019
):
1
11
.
13.
Bhargava
,
Swati
, and
Manish
Mukhija
. "
HIDE IMAGE AND TEXT USING LSB, DWT AND RSA BASED ON IMAGE STEGANOGRAPHY
."
ICTACT Journal on Image & Video Processing
9
.
3
(
2019
).
14.
Sharma
,
Jagdish
, and
Ramesh
Thapa
. "
Hybrid approach for data security using RSA and LSB Algorithm
."
Proceedings of IOE Graduate Conference.
2019
.
15.
Kareem
,
Hassanain
Raheem
,
Hadi Hussein
Madhi
, and
Keyan Abdul-Aziz
Mutlaq
. "
Hiding encrypted text in image steganography
."
Periodicals of Engineering and Natural Sciences (PEN)
8
.
2
(
2020
):
703
707
.
16.
Shah
,
Syed Tahir
Ali
,
Aihab
Khan
, and
Afaq
Hussain
. "
Text steganography using character spacing after normalization
."
Int. J. Sci. Eng. Res
11
(
2020
):
949
957
.
17.
Johnson
,
Neil
F.
, and
Sushil
Jajodia
. "
Exploring Steganography the unseen
"
. Computer
,
31
.
2
,
1998
: pp.
26
34
.
18.
May
H.
,
Su
W. P.
A New Embedding Algorithm for Data Security
”,
International Conference on Data Mining, Electronics and Information Technology (DMEIT’15)
,
Pattaya, Thailand
,
2015
.
19.
Chandra
P. S.
,
Ramneet
S. C.
, and
Abhishek
K.
, “
Enhance Security in Steganography with cryptography
”,
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
Vol.
3
, Issue
3
, ISSN (Online): 2278-1021, March
2014
, pp.
5696
5699
20.
Swati
M.
,
Manish
S.
,
Dr.
Anubhuti
K.
, “
Audio Steganography by Different Methods
”,
International Journal of Emerging Technology and Advanced Engineering (IJETAE)
, Vol.
2
, Issue
7
, ISSN 2250-2459, (
2012
).
21.
Dagar
,
Ekta
, and
Sunny
Dagar
. "
LSB-based image steganography using x-box mapping
."
Advances in Computing, Communications, and Informatics (ICACCI, 2014 International Conference
on.
IEEE
,
2014
.
22.
Zhang
,
Hao
,
Tao
Zhang
, and
Huajin
Chen
. "
Variance Analysis of Pixel-Value Differencing Steganography
."
Proceedings of the 2017 International Conference on Cryptography, Security, and Privacy
.
ACM
,
2017
.
23.
Kaur
,
Harpreet
, and
Jyoti
Rani
. "
A Survey on different techniques of steganography
."
MATEC Web of Conferences.
Vol.
57
. EDP Sciences,
2016
.
24.
M.
Dixit
,
N.
Bhide
,
S.
Khankhoje
, and
R.
Ukraine
, “
Video Steganography
,”
2015 Int. Conf. Pervasive Comput.
, vol.
00
, no.
c
, pp.
1
4
, (
2015
)
25.
Kaur Amandeep
Kaur
,
Manpreet
, “
Improved Security Mechanism of Text in Video using Steganographic Technique
,”
Int. J. Adv. Res. Comput. Sci. Softw. Eng.
, vol.
7782
, no.
5
, pp.
44
51
, (
2014
).
26.
J.
Gupta
, “
A Review on Steganography techniques and methods
,” vol.
1
, no.
1
, pp.
1
4
, (
2015
).
27.
Comput.
, vol.
00
, no.
c
, pp.
1
4
, (
2015
) 8.
R. J.
Mustafa
and
I.
Studen
, “
A High Payload Video Steganography Algorithm in DWT Domain Based on BCH Codes (15, 11)
,” (
2015
)
28.
Bahirat
,
Rucha
, and
Amit
Kolhe
. "
Overview of secure data transmission using Steganography
."
International Journal of Emerging Technology and Advanced Engineering
4
.
3
(
2014
):
307
310
.
29.
Elnajjar
,
Mahmoud
, et al "
Optimization digital image watermarking technique for patent protection.
" arXiv preprint arXiv:1002.4049 (
2010
: pp.
142
148
30.
Swain
,
Gandharba
, and
Saroj Kumar
Lenka
. "
Classification of image steganography techniques in spatial domain: a study
."
Journal of Computer Science & Engineering Technology (IJCSET)
5
.
03
(
2014
):
219
232
.
31.
Jalab
,
Hamid
,
A. A.
Zaidan
, and
B. B.
Zaidan
. "
Frame selected approach for hiding data within MPEG video using bit-plane complexity segmentation.
" arXiv preprint arXiv:0912.3986 (
2009
): pp.
108
113
32.
C.
Science
and
B.
Bridgeport
, “
A Novel Video Steganography Algorithm in the Wavelet Domain Based on the KLT Tracking Algorithm and BCH Codes
,” (
2015
)
33.
Jassim
,
Firas
A.
"
A novel steganography algorithm for hiding text in image using five modulus method.
" arXiv preprint arXiv:1307.0642 (
2013
): pp.
39
44
34.
Kaur
,
Harpreet
, and
Jyoti
Rani
. "
A Survey on different techniques of steganography
."
MATEC Web of Conferences.
Vol.
57
. EDP Sciences,
2016
.
35.
Kumar
,
Arvind
and
Km
Pooja
. “
Steganography-A data hiding technique
.”
International Journal of Computer Applications
9
.
7
,
19
23
,
2010
.
This content is only available via PDF.
You do not currently have access to this content.