Abstract

This paper delves into the realm of steganography, focusing on the evolution of techniques employed to conceal data within digital images. Beginning with an exploration of the motivations behind information security and the role of cryptography, the paper introduces adaptive steganography as a discreet means of incorporating private data into a cover medium. The discussion then shifts to the three key factors in image steganography - resilience, capacity, and imperceptibility - forming the foundation of effective data hiding. The spatial and frequency domain methods are compared, with specific emphasis on the classical Least Significant Bit insertion and more advanced adaptive steganography techniques. The paper further introduces edge-based steganography, highlighting the advantage of manipulating edge areas for increased imperceptibility. Moving beyond definitions and types, the paper provides a comprehensive analysis of notable research works in the field, elucidating their objectives, methodologies, results, strengths, and limitations. The conclusion reflects on the dynamic landscape of steganography, acknowledging both achievements and areas for improvement.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call