2021
DOI: 10.1007/s41324-021-00393-7
|View full text |Cite
|
Sign up to set email alerts
|

A roadmap of steganography tools: conventional to modern

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…3% as assessed from [22]) is devoted to software tools. There are publications available on steganography tools [23] [24] [25] [26], but they are not dedicated solely to audio files. In general, less than half of the enlisted tools can operate on sound files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…3% as assessed from [22]) is devoted to software tools. There are publications available on steganography tools [23] [24] [25] [26], but they are not dedicated solely to audio files. In general, less than half of the enlisted tools can operate on sound files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various relevant steganographic techniques are utilized to achieve security depending on the carrier’s kind ( Ali & Uddin, 2019 ). The steganography technologies created during the past three decades have been thoroughly examined in Pilania et al (2021) . These tools’ strengths, weaknesses, applicability, and opportunity for future study are all represented in the comparative analysis of these tools based on the given parameters.…”
Section: Introductionmentioning
confidence: 99%