Review on Common Steganography Techniques

Main Article Content

Noor Kadhim Ayoob
Asraa Abdullah Hussein

Abstract

Various authorities are keen to preserve the confidentiality of their information and protect it from competing or hostile parties who were also keen to access that information by all available means. Since the encryption of information is exposed as it produces incomprehensible texts that arouse suspicion, some tend to work in a way that removes suspicions by hiding the information in a medium like text or picture so that what is sent and circulated appears natural and free of signs or incomprehensible symbols as if not loaded with any additional information. This paper introduces a review the techniques used to hide data in images as one of the most common concealment techniques.

Article Details

How to Cite
[1]
“Review on Common Steganography Techniques”, JUBPAS, vol. 30, no. 4, pp. 153–164, Dec. 2022, doi: 10.29196/jubpas.v30i4.4416.
Section
Articles

How to Cite

[1]
“Review on Common Steganography Techniques”, JUBPAS, vol. 30, no. 4, pp. 153–164, Dec. 2022, doi: 10.29196/jubpas.v30i4.4416.

Similar Articles

You may also start an advanced similarity search for this article.