A survey on image steganography

Nidhi Menon, Vaithiyanathan
{"title":"A survey on image steganography","authors":"Nidhi Menon, Vaithiyanathan","doi":"10.1109/TAPENERGY.2017.8397274","DOIUrl":null,"url":null,"abstract":"In many areas security systems are very popular as the technologies are increasing day-by-day. Using encryption and steganography information security can be achieved. In today's world, cryptography is most often associated with scrambling plaintext into ciphertext, then back again. In the presence of third parties, it is a practice for secure communication. From the past times to the present times to keep the confidential information secure has always been a major issue. Researchers always found it interesting developing secure techniques such that the data could reach from the sender to without revealing it to any third party. Hence many techniques were developed to securely transfer data and among them one is steganography. Steganography is a step farther to cryptography as it hides an encrypted message such that no one knows it exists. Its success depends on the secrecy of the action and if detected, the system will fail but security of data depends on the robustness of the applied algorithm.","PeriodicalId":237016,"journal":{"name":"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"49","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TAPENERGY.2017.8397274","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 49

Abstract

In many areas security systems are very popular as the technologies are increasing day-by-day. Using encryption and steganography information security can be achieved. In today's world, cryptography is most often associated with scrambling plaintext into ciphertext, then back again. In the presence of third parties, it is a practice for secure communication. From the past times to the present times to keep the confidential information secure has always been a major issue. Researchers always found it interesting developing secure techniques such that the data could reach from the sender to without revealing it to any third party. Hence many techniques were developed to securely transfer data and among them one is steganography. Steganography is a step farther to cryptography as it hides an encrypted message such that no one knows it exists. Its success depends on the secrecy of the action and if detected, the system will fail but security of data depends on the robustness of the applied algorithm.
图像隐写技术综述
随着技术的日益发展,安防系统在许多领域都很受欢迎。采用加密和隐写技术可以实现信息安全。在当今世界,密码学通常与将明文加扰为密文,然后再加扰为密文有关。在第三方在场的情况下,这是一种安全通信的做法。从过去到现在,保密信息的安全一直是一个重大问题。研究人员总是发现开发安全技术很有趣,这样数据就可以从发送者到达而不会泄露给任何第三方。因此,人们开发了许多安全传输数据的技术,其中之一就是隐写术。隐写术是密码学的一步,因为它隐藏了加密的消息,这样就没有人知道它的存在。它的成功取决于动作的保密性,如果被检测到,系统将失败,但数据的安全性取决于所应用算法的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信