Abstract

This paper delves into the realm of steganography, focusing on the evolution of techniques employed to conceal data within digital images. Beginning with an exploration of the motivations behind information security and the role of cryptography, the paper introduces adaptive steganography as a discreet means of incorporating private data into a cover medium. The discussion then shifts to the three key factors in image steganography - resilience, capacity, and imperceptibility - forming the foundation of effective data hiding. The spatial and frequency domain methods are compared, with specific emphasis on the classical Least Significant Bit insertion and more advanced adaptive steganography techniques. The paper further introduces edge-based steganography, highlighting the advantage of manipulating edge areas for increased imperceptibility. Moving beyond definitions and types, the paper provides a comprehensive analysis of notable research works in the field, elucidating their objectives, methodologies, results, strengths, and limitations. The conclusion reflects on the dynamic landscape of steganography, acknowledging both achievements and areas for improvement.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.