Abstract
The proliferation of digitalization in the realm of information has paved the way for numerous types of multimedia data to be attacked. Hence, the security of information has become a critical concern. Over the years, image steganography has been widely acknowledged as one of the most effective techniques for securing confidential information. This methodology comprises the integration of sensitive information into a cover image via the manipulation of specific pixels, resulting in the formation of a steganography image. However, it is imperative to note that such manipulations could be identified by steganalysis algorithms, thus undermining the security of the message. To address the aforementioned concern, the notion of coverless image steganography has been introduced, which serves as a promising solution. The coverless image steganography technique entails the establishment of a mapping correlation between the content of the clandestine message and the cover images, while leaving the cover images unaltered. This review article meticulously scrutinizes the recent studies on coverless image steganography, thereby furnishing significant and profound insights into the techniques
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have