Open Access Open Access  Restricted Access Subscription Access

An Extensive Study of Digital Image Steganography Techniques


Affiliations
1 Department of Computer Science & Engineering, Baba Mastnath University, Rohtak - 123 106, Haryana, India

   Subscribe/Renew Journal


The rise of digital technology raises the importance of data security when transmitting data across a wireless communication medium. Steganography is a method of ensuring information security on a digital media. The goal of this work is to look at information hiding techniques in images which are in the spatial domain. This paper will also distinguish between watermarking and steganography, the two most popular domains of information concealment. The paper examines the benefits and drawbacks of existing algorithms, tools, and strategies to safeguard data in the digital image steganography domain.

Keywords

Data Hiding, Information Security, Steganography, Time Domain Techniques, Watermarking.
User
Subscription Login to verify subscription
Notifications
Font Size


  • An Extensive Study of Digital Image Steganography Techniques

Abstract Views: 287  |  PDF Views: 0

Authors

Juhi Singh
Department of Computer Science & Engineering, Baba Mastnath University, Rohtak - 123 106, Haryana, India
Mukesh Singla
Department of Computer Science & Engineering, Baba Mastnath University, Rohtak - 123 106, Haryana, India

Abstract


The rise of digital technology raises the importance of data security when transmitting data across a wireless communication medium. Steganography is a method of ensuring information security on a digital media. The goal of this work is to look at information hiding techniques in images which are in the spatial domain. This paper will also distinguish between watermarking and steganography, the two most popular domains of information concealment. The paper examines the benefits and drawbacks of existing algorithms, tools, and strategies to safeguard data in the digital image steganography domain.

Keywords


Data Hiding, Information Security, Steganography, Time Domain Techniques, Watermarking.

References





DOI: https://doi.org/10.17010/ijcs%2F2022%2Fv7%2Fi4%2F172378