Beta
63662

A Survey of Different Steganography Techniques

Article

Last updated: 25 Dec 2024

Subjects

-

Tags

-

Abstract

Steganography is defined as the art and science of embedding data
in a cover object without leaving a remarkable track on the cover
object, in other words it is the study of invisible communications. It is
usually dealing with the methods of hiding the existence of data to
be transmitted in such a way that, it remains confidential. The main
objectives of steganography are high capacity of the hidden data,
perceptual transparency (invisibility), temper resistance,
undetectability, computation complexity and robustness. It is
classified into three categories which are; pure (no key), secret key,
public key steganography. According to the type of the cover object,
there are different types of steganography which are; image, audio,
video, network and text. In the image steganography, the secrecy
can be achieved by hiding data into the cover image and generating
the stego-image. According to the embedding techniques, there are
different techniques of steganography which are those embedding
in the spatial domain (substitution method), those embedding in the
transform domain (frequency domain), spread spectrum techniques,
distortion techniques, masking and filtering techniques, and cover
generation techniques. Each of these techniques has its strengths
and weaknesses for different algorithms. This paper presents a
review of these techniques; the different algorithms, concepts,
advantages and disadvantages. The steps of the different
algorithms of these techniques will presented in details, with a
comparison between all these techniques. The different applications
of steganography, the attacks, and the robust image steganography
against attacks are presented. Lastly, the future and the novel
trends in steganography are presented.

DOI

10.21608/mjeer.2016.63662

Authors

First Name

E. A.

Last Name

Elshazly

MiddleName

-

Affiliation

Engineering Dep., Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt.

Email

-

City

-

Orcid

-

First Name

Safey A. S.

Last Name

Abdelwahab

MiddleName

-

Affiliation

Engineering Dep., Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt.

Email

-

City

-

Orcid

-

First Name

R. M.

Last Name

Fikry

MiddleName

-

Affiliation

Engineering Dep., Nuclear Research Center, Atomic Energy Authority, Cairo, Egypt.

Email

-

City

-

Orcid

-

First Name

O.

Last Name

Zahran

MiddleName

-

Affiliation

Electronics and Electrical Communications Engineering Dep., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt

Email

-

City

-

Orcid

-

First Name

S. M.

Last Name

Elaraby

MiddleName

-

Affiliation

Electronics and Electrical Communications Engineering Dep., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt

Email

-

City

-

Orcid

-

First Name

M.

Last Name

El-Kordy

MiddleName

-

Affiliation

Electronics and Electrical Communications Engineering Dep., Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt

Email

-

City

-

Orcid

-

Volume

25

Article Issue

1

Related Issue

9500

Issue Date

2016-01-01

Receive Date

2015-11-15

Publish Date

2016-01-01

Page Start

66

Page End

102

Print ISSN

1687-1189

Online ISSN

2682-3535

Link

https://mjeer.journals.ekb.eg/article_63662.html

Detail API

https://mjeer.journals.ekb.eg/service?article_code=63662

Order

4

Type

Original Article

Type Code

1,088

Publication Type

Journal

Publication Title

Menoufia Journal of Electronic Engineering Research

Publication Link

https://mjeer.journals.ekb.eg/

MainTitle

A Survey of Different Steganography Techniques

Details

Type

Article

Created At

22 Jan 2023