A survey on image steganography algorithms and evaluation
The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2011
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/29735/ http://dx.doi.org/10.1007/978-3-642-22389-1_36 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.29735 |
---|---|
record_format |
eprints |
spelling |
my.utm.297352017-10-23T06:52:05Z http://eprints.utm.my/id/eprint/29735/ A survey on image steganography algorithms and evaluation Lashkari, Arash Habibi Abdul Manaf, Azizah Masrom, Maslin Mohd. Daud, Salwani T Technology (General) The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally different; the output from a stegonography operation is not apparently visible while for cryptography the output is scrambled such that it easily draws attention. The detection of the presence of stegonography is referred to as Steganlysis. In this article we have attempted to elucidate the main image steganography approaches, and then we will evaluate the techniques and result will show in a table and discuss. 2011-07-07 Conference or Workshop Item PeerReviewed Lashkari, Arash Habibi and Abdul Manaf, Azizah and Masrom, Maslin and Mohd. Daud, Salwani (2011) A survey on image steganography algorithms and evaluation. In: The International Conference on Digital Information Processing and Communications (ICDIPC), 7-9 July 2011, VSB-Technical University of Ostrava, Ostrava, Czech. http://dx.doi.org/10.1007/978-3-642-22389-1_36 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Lashkari, Arash Habibi Abdul Manaf, Azizah Masrom, Maslin Mohd. Daud, Salwani A survey on image steganography algorithms and evaluation |
description |
The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally different; the output from a stegonography operation is not apparently visible while for cryptography the output is scrambled such that it easily draws attention. The detection of the presence of stegonography is referred to as Steganlysis. In this article we have attempted to elucidate the main image steganography approaches, and then we will evaluate the techniques and result will show in a table and discuss. |
format |
Conference or Workshop Item |
author |
Lashkari, Arash Habibi Abdul Manaf, Azizah Masrom, Maslin Mohd. Daud, Salwani |
author_facet |
Lashkari, Arash Habibi Abdul Manaf, Azizah Masrom, Maslin Mohd. Daud, Salwani |
author_sort |
Lashkari, Arash Habibi |
title |
A survey on image steganography algorithms and evaluation |
title_short |
A survey on image steganography algorithms and evaluation |
title_full |
A survey on image steganography algorithms and evaluation |
title_fullStr |
A survey on image steganography algorithms and evaluation |
title_full_unstemmed |
A survey on image steganography algorithms and evaluation |
title_sort |
survey on image steganography algorithms and evaluation |
publishDate |
2011 |
url |
http://eprints.utm.my/id/eprint/29735/ http://dx.doi.org/10.1007/978-3-642-22389-1_36 |
_version_ |
1643648363191599104 |
score |
13.160551 |