Comparative study of different steganographic techniques
Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undet...
| Main Authors: | , , , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/8897/ http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf |
| _version_ | 1848777075222118400 |
|---|---|
| author | Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. |
| author_facet | Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. |
| author_sort | Zeki, Akram M. |
| building | IIUM Repository |
| collection | Online Access |
| description | Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data. When it comes to the pro and cons of various Steganographic software, many have been designed; each of them has different features and capabilities for data hiding, hence, this makes it a wide and attractive field for further research, in which the establishment of innovative methods and techniques could be done. Different Steganographic techniques were studied; experiment was carried out using five Steganographic software. Finally comparison was done using benchmarking tool for identifying different performance aspects of the Steganographic techniques and Steganographic software like visual quality, performance indices, memory requirement and the evaluation of the maximum capacity for each software under this study. Experimental results show that all the software under this study performs above optimal level, although there are some differences of features and capabilities observed. |
| first_indexed | 2025-11-14T14:40:13Z |
| format | Proceeding Paper |
| id | iium-8897 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T14:40:13Z |
| publishDate | 2011 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-88972014-12-08T07:57:42Z http://irep.iium.edu.my/8897/ Comparative study of different steganographic techniques Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. TK Electrical engineering. Electronics Nuclear engineering Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such a way that it will be undetectable, robust and the innocent data should be able to accommodate high capacity of the secret data. When it comes to the pro and cons of various Steganographic software, many have been designed; each of them has different features and capabilities for data hiding, hence, this makes it a wide and attractive field for further research, in which the establishment of innovative methods and techniques could be done. Different Steganographic techniques were studied; experiment was carried out using five Steganographic software. Finally comparison was done using benchmarking tool for identifying different performance aspects of the Steganographic techniques and Steganographic software like visual quality, performance indices, memory requirement and the evaluation of the maximum capacity for each software under this study. Experimental results show that all the software under this study performs above optimal level, although there are some differences of features and capabilities observed. 2011-10-03 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf Zeki, Akram M. and Ibrahim, Adamu A. and A. Manaf, Azizah and Abdullah, Shahidan M. (2011) Comparative study of different steganographic techniques. In: 11th WSEAS International Conference on Applied Computer Science (ACS 2011), 3-5 October 2011, Penang, Malaysia. http://www.wseas.us/e-library/conferences/2011/Penang/ACRE/ACRE-06.pdf |
| spellingShingle | TK Electrical engineering. Electronics Nuclear engineering Zeki, Akram M. Ibrahim, Adamu A. A. Manaf, Azizah Abdullah, Shahidan M. Comparative study of different steganographic techniques |
| title | Comparative study of different steganographic techniques |
| title_full | Comparative study of different steganographic techniques |
| title_fullStr | Comparative study of different steganographic techniques |
| title_full_unstemmed | Comparative study of different steganographic techniques |
| title_short | Comparative study of different steganographic techniques |
| title_sort | comparative study of different steganographic techniques |
| topic | TK Electrical engineering. Electronics Nuclear engineering |
| url | http://irep.iium.edu.my/8897/ http://irep.iium.edu.my/8897/ http://irep.iium.edu.my/8897/3/ACRE-06_8897.pdf |