A Survey on Image Data Hiding Techniques**

Mahmoud Mohamed, S. Ghoniemy, N. Ghali
{"title":"A Survey on Image Data Hiding Techniques**","authors":"Mahmoud Mohamed, S. Ghoniemy, N. Ghali","doi":"10.21608/ijicis.2022.130393.1174","DOIUrl":null,"url":null,"abstract":": Due to the observed growth in recent years of digital image communication, computer technologies, and image processing techniques image security has been an essential demand due to the different image attacks. Image security approaches are classified into cryptography and data hiding techniques, including digital watermarking and steganography. This study paper reviews existing picture data hiding techniques, their benefits and drawbacks, and future research directions. In addition to the survey, we included a brief explanation of several geometric and image processing attacks that impair picture transmission. General multimedia security ideas, primary requirements, and recent applications We addressed various approaches and their characteristics, types, requirements, and working mechanisms. We classify the techniques based on different domains. General concepts of data hiding approaches, their characteristics, recent applications used in, also recent research work for proposed techniques is discussed in the following sections, finally, a comparison between different methodologies has been presented in a table.","PeriodicalId":244591,"journal":{"name":"International Journal of Intelligent Computing and Information Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligent Computing and Information Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijicis.2022.130393.1174","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

: Due to the observed growth in recent years of digital image communication, computer technologies, and image processing techniques image security has been an essential demand due to the different image attacks. Image security approaches are classified into cryptography and data hiding techniques, including digital watermarking and steganography. This study paper reviews existing picture data hiding techniques, their benefits and drawbacks, and future research directions. In addition to the survey, we included a brief explanation of several geometric and image processing attacks that impair picture transmission. General multimedia security ideas, primary requirements, and recent applications We addressed various approaches and their characteristics, types, requirements, and working mechanisms. We classify the techniques based on different domains. General concepts of data hiding approaches, their characteristics, recent applications used in, also recent research work for proposed techniques is discussed in the following sections, finally, a comparison between different methodologies has been presented in a table.
图像数据隐藏技术综述**
由于近年来数字图像通信,计算机技术和图像处理技术的增长,由于不同的图像攻击,图像安全已经成为一种基本需求。图像安全方法分为加密技术和数据隐藏技术,包括数字水印和隐写技术。本文综述了现有的图像数据隐藏技术及其优缺点,并展望了未来的研究方向。除了调查之外,我们还简要解释了几种损害图像传输的几何和图像处理攻击。一般多媒体安全思想、主要需求和最新应用我们讨论了各种方法及其特点、类型、需求和工作机制。我们根据不同的领域对技术进行分类。数据隐藏方法的一般概念,它们的特点,最近的应用,以及最近的研究工作中提出的技术将在以下部分进行讨论,最后,不同的方法之间的比较已经在一个表中提出。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信