A review of steganographic methods and techniques

The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video,...

Full description

Bibliographic Details
Main Authors: Beroual, Abdessalam, Alshaikhli, Imad Fakhri Taha
Format: Article
Language:English
Published: Kulliyah of Information and Communication Technology, International Islamic University Malaysia 2018
Subjects:
Online Access:http://irep.iium.edu.my/64307/
http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf
_version_ 1848786190290911232
author Beroual, Abdessalam
Alshaikhli, Imad Fakhri Taha
author_facet Beroual, Abdessalam
Alshaikhli, Imad Fakhri Taha
author_sort Beroual, Abdessalam
building IIUM Repository
collection Online Access
description The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded information. Many challenges confront steganography systems like capacity (size of data embedded) and imperceptibility (level of undetectability). These two aspects are inversely proportional to each other which produces a data hiding dilemma. This paper presents a review of the steganography methods used in recent years and a critical analysis based mainly on capacity measurement and, secondly, on imperceptibility measurement and steganography domain.
first_indexed 2025-11-14T17:05:06Z
format Article
id iium-64307
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T17:05:06Z
publishDate 2018
publisher Kulliyah of Information and Communication Technology, International Islamic University Malaysia
recordtype eprints
repository_type Digital Repository
spelling iium-643072018-07-03T01:49:36Z http://irep.iium.edu.my/64307/ A review of steganographic methods and techniques Beroual, Abdessalam Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science The frequent and intensive transmission of information on the internet requires protection techniques to secure sensitive information. Steganography is one of many security techniques that consist of concealing information inside an appropriate multimedia (e.g. image, video, audio…etc.) with the objective to hide the embedded information. Many challenges confront steganography systems like capacity (size of data embedded) and imperceptibility (level of undetectability). These two aspects are inversely proportional to each other which produces a data hiding dilemma. This paper presents a review of the steganography methods used in recent years and a critical analysis based mainly on capacity measurement and, secondly, on imperceptibility measurement and steganography domain. Kulliyah of Information and Communication Technology, International Islamic University Malaysia 2018-06-08 Article PeerReviewed application/pdf en http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf Beroual, Abdessalam and Alshaikhli, Imad Fakhri Taha (2018) A review of steganographic methods and techniques. International Journal on Perceptive and Cognitive Computing (IJPCC), 4 (1). pp. 1-6. E-ISSN 2462-229X http://journals.iium.edu.my/ijpcc/index.php/IJPCC/article/view/56
spellingShingle QA75 Electronic computers. Computer science
Beroual, Abdessalam
Alshaikhli, Imad Fakhri Taha
A review of steganographic methods and techniques
title A review of steganographic methods and techniques
title_full A review of steganographic methods and techniques
title_fullStr A review of steganographic methods and techniques
title_full_unstemmed A review of steganographic methods and techniques
title_short A review of steganographic methods and techniques
title_sort review of steganographic methods and techniques
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/64307/
http://irep.iium.edu.my/64307/
http://irep.iium.edu.my/64307/1/ijpcc-abdulsalam.pdf