IIUM Repository

A review of steganographic methods and techniques

Beroual, Abdessalam and Alshaikhli, Imad Fakhri Taha (2018) A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 4 (1). pp. 1-6. E-ISSN 2462-229X

[img] PDF - Published Version
Restricted to Repository staff only

Download (157kB) | Request a copy


The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded information. Many challenges confront steganography systems like capacity (size of data embedded) and imperceptibility (level of undetectability). These two aspects are inversely proportional to each other which produces a data hiding dilemma. This paper presents a review of the steganography methods used in recent years and a critical analysis based mainly on capacity measurement and, secondly, on imperceptibility measurement and steganography domain.

Item Type: Article (Journal)
Additional Information: 6534/64307
Uncontrolled Keywords: Steganography, capacity, properties of steganography, types of steganography.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Professor Imad Taha
Date Deposited: 03 Jul 2018 09:49
Last Modified: 03 Jul 2018 09:49
URI: http://irep.iium.edu.my/id/eprint/64307

Actions (login required)

View Item View Item


Downloads per month over past year