Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A literature review of various steganography methods
Author(s):
1. MUSTAFA MUNEEB TAHER: College of Computing Science & Information Technology, University of Tenaga, Malaysia
2. ABD RAHIM BIN HJ AHMAD: College of Computing Science & Information Technology, University of Tenaga, Malaysia
3. RANA SAMI HAMEED: Faculty of Engineering & Built Environment, Universiti Kebangsaan Malaysia; College of Law and Political Science, University of Kirkuk Iraq
4. SITI SALASIAH MOKRI: Faculty of Engineering & Built Environment, Universiti Kebangsaan Malaysia
Abstract:
Nowadays, the volume of data shared over the Internet is growing. As a result, data security is referred to as a major issue while processing data communications through the Internet. During communication procedures, everyone requires their data to remain secure. Steganography is the science and art of embedding audio, message, video, or image into another audio, image, video, or message to conceal it. It is used to secure confidential information from harmful attacks. This research offers a classification of digital steganography based on cover object categories, as well as a classification of steganalysis art. Image visual quality, structural similarity (SSIM), mean square error, Image Fidelity (IF), payload capacity, Normalized Cross-Correlation (NCC), and robustness are some of the important aspects of steganography. Researchers have made tremendous advances in the realm of digital steganography. Nonetheless, it is vital to emphasize the advantages and disadvantages of modern steganography techniques. The purpose of this research is to examine and compare several steganography methods using characteristics such as PSNR, MSE, and Robustness. This study arrived at 15 possible research directions for developing high-quality stego objects, strong stenography techniques, and high payload based on the analysis of the studied parameters.
Page(s): 1412-1427
DOI: DOI not available
Published: Journal: Journal of Theoretical and Applied Information Technology, Volume: 100, Issue: 5, Year: 2022
Keywords:
DNA Steganography , Image Steganography , Audio Steganography , Information hidings , Network Steganography , Video Steganography
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

25

Views