A survey on image steganography algorithms and evaluation

The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally...

Full description

Saved in:
Bibliographic Details
Main Authors: Lashkari, Arash Habibi, Abdul Manaf, Azizah, Masrom, Maslin, Mohd. Daud, Salwani
Format: Conference or Workshop Item
Published: 2011
Subjects:
Online Access:http://eprints.utm.my/id/eprint/29735/
http://dx.doi.org/10.1007/978-3-642-22389-1_36
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.29735
record_format eprints
spelling my.utm.297352017-10-23T06:52:05Z http://eprints.utm.my/id/eprint/29735/ A survey on image steganography algorithms and evaluation Lashkari, Arash Habibi Abdul Manaf, Azizah Masrom, Maslin Mohd. Daud, Salwani T Technology (General) The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally different; the output from a stegonography operation is not apparently visible while for cryptography the output is scrambled such that it easily draws attention. The detection of the presence of stegonography is referred to as Steganlysis. In this article we have attempted to elucidate the main image steganography approaches, and then we will evaluate the techniques and result will show in a table and discuss. 2011-07-07 Conference or Workshop Item PeerReviewed Lashkari, Arash Habibi and Abdul Manaf, Azizah and Masrom, Maslin and Mohd. Daud, Salwani (2011) A survey on image steganography algorithms and evaluation. In: The International Conference on Digital Information Processing and Communications (ICDIPC), 7-9 July 2011, VSB-Technical University of Ostrava, Ostrava, Czech. http://dx.doi.org/10.1007/978-3-642-22389-1_36
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic T Technology (General)
spellingShingle T Technology (General)
Lashkari, Arash Habibi
Abdul Manaf, Azizah
Masrom, Maslin
Mohd. Daud, Salwani
A survey on image steganography algorithms and evaluation
description The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally different; the output from a stegonography operation is not apparently visible while for cryptography the output is scrambled such that it easily draws attention. The detection of the presence of stegonography is referred to as Steganlysis. In this article we have attempted to elucidate the main image steganography approaches, and then we will evaluate the techniques and result will show in a table and discuss.
format Conference or Workshop Item
author Lashkari, Arash Habibi
Abdul Manaf, Azizah
Masrom, Maslin
Mohd. Daud, Salwani
author_facet Lashkari, Arash Habibi
Abdul Manaf, Azizah
Masrom, Maslin
Mohd. Daud, Salwani
author_sort Lashkari, Arash Habibi
title A survey on image steganography algorithms and evaluation
title_short A survey on image steganography algorithms and evaluation
title_full A survey on image steganography algorithms and evaluation
title_fullStr A survey on image steganography algorithms and evaluation
title_full_unstemmed A survey on image steganography algorithms and evaluation
title_sort survey on image steganography algorithms and evaluation
publishDate 2011
url http://eprints.utm.my/id/eprint/29735/
http://dx.doi.org/10.1007/978-3-642-22389-1_36
_version_ 1643648363191599104
score 13.160551