International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 184 - Number 51 |
Year of Publication: 2023 |
Authors: Dayabati Markam, Devashri Deoskar, Amit Saxena |
10.5120/ijca2023922643 |
Dayabati Markam, Devashri Deoskar, Amit Saxena . A Detailed Survey of Image Steganography Methods. International Journal of Computer Applications. 184, 51 ( Mar 2023), 45-51. DOI=10.5120/ijca2023922643
Security systems are very popular in many places because technology is getting better and better every day. Information security can be achieved by utilizing encryption and steganography. Cryptography is typically associated with scrambling plain text into cipher ext and back again in today's world. Maintaining the safety of confidential information has always been a major concern, from ancient times to the present. As a result, numerous methods for securely transferring data were developed, one of which is steganography. Steganography takes cryptography one step further by concealing an encrypted message so that no one is aware of its existence. The primary goal of Steganography is to conceal the embedded data's existence. Due to the remarkable advancement in computational power, the steganography technique has enhanced the security of existing methods for hiding data. Steganography system fundamentals, evaluation methods, and security aspects, as well as various spatial and transform domain embedding schemes, are discussed in this article. In addition, a brief overview of various image steganography methods is provided in this paper.