2011
DOI: 10.1002/wics.152
|View full text |Cite
|
Sign up to set email alerts
|

Image steganography and steganalysis

Abstract: Image steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today's digital world where information is often and easily exchanged through the Internet, email, and other means using computers. The need for better methods and techniques which can be used bo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…• Discrete Cosine Transform (DCT) This transform is very useful to reasons effectiveness and flexibility, and it applied to samples of the signal and its characteristics that the image fragmented into two-dimensional sections [4] used this transform in this paper because of its nature into dividing the image into a set of parts.…”
Section: -Frequency Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…• Discrete Cosine Transform (DCT) This transform is very useful to reasons effectiveness and flexibility, and it applied to samples of the signal and its characteristics that the image fragmented into two-dimensional sections [4] used this transform in this paper because of its nature into dividing the image into a set of parts.…”
Section: -Frequency Domainmentioning
confidence: 99%
“…Steganalysis is the technique and science that is used to decide if the messages are involved in the image or not by the steganography algorithm. Steganalysis system is utilized to find, extract, disable or change the message before arriving at the recipient [4]. Misuse of hidden writing poses real risks at various levels.…”
Section: Introductionmentioning
confidence: 99%
“…It was very popular during World War II when spies on both sides of the war used steganography to pass secret messages [6]. It can also be used for criminal activities as it was suspected that Al-Qaeda used steganography in their attack on World Trade Centre [11]. Nowadays with the advent of Internet there is ever burgeoning need to protect and hide sensitive data.…”
Section: Historymentioning
confidence: 99%
“…Quality of images remains intact and human eye cannot discern the changes [25]. Wavelets are relatively new in the image processing and offer lesser distortion and are less resource hungry as compared to DCT and are thus employed for noise reduction, edge detection in image processing [11].…”
Section: Dwt Image Steganographymentioning
confidence: 99%
“…Methodologies has transformed from physical to complex steganography and cryptographic algorithms. Steganography was also suspected to be used in the attacks of World Trade Centre (Bachrach and Shih, 2011). Steganography employs different carrier medium such as text, images, audio and video (Al-Qwider and Salameh, 2017; Khan and Gutub, 2007;Nosrati et al, 2012;Singh et al, 2014).…”
Section: Introductionmentioning
confidence: 99%