The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Transform Domain Techniques for Image Steganography
Abstract
Recent advancement of multimedia technology has posed serious challenges to copyright protection, ownership, and integrity of digital data. This has made information security techniques a vital issue. Cryptography, Steganography, and Watermarking are three major techniques for securing information and ensuring copyright ownership. This chapter presents an overview of transform domain techniques for image steganography. The authors discuss the characteristics and applications of image steganography and briefly review Discrete Cosine and Wavelet transform-based image steganography techniques. They also discuss the various metrics that have been used to assess the performance of steganography techniques and shed light on the future of steganography.
Related Content
Jayashri Dutta, Smitakshi Medhi, Mayurakshi Gogoi, Lisha Borgohain, Nourhan Gamal Abdel Maboud, Hanaa Mustafa Muhameed.
© 2025.
34 pages.
|
Abdellah Khouz, Jorge Trindade, Fatima El Bchari, Pedro Pinto Santos, Eusébio Reis, Adil Moumane, Fatima Ezzahra El Ghazali, Mourad Jadoud, Blaid Bougadir.
© 2025.
38 pages.
|
Phyo Thandar Hlaing, Muhammad Waqas, Usa Wannasingha Humphries.
© 2025.
32 pages.
|
Adil Moumane, Jamal Al Karkouri, Batchi Mouhcine.
© 2025.
28 pages.
|
Abdessamad Elmotawakkil, Nourddine Enneya.
© 2025.
20 pages.
|
Fatima Ezzahra El Ghazali, Abdellah Khouz.
© 2025.
30 pages.
|
Tarik Bahouq, Amina Moumane, Nadia Touhami.
© 2025.
28 pages.
|
|
|