Steganography surpasses other mechanisms of securing data from potential threats. The modern digital arena calls for robust information hiding techniques and, thus, it has always been a flash point for researchers and academicians. Nowadays, transmission is susceptible to numerous hacks while sharing secret information through typical correspondence channel. Accordingly, everybody needs the classification, respectability, and realness of his or her privileged information. Particularly, different techniques are used to take on these security issues like advanced declaration, computerized mark, and cryptography. Nevertheless, these strategies alone cannot be negotiated. Steganography is a revolution where current information compression, data hypothesis, spread range, and cryptography advancements are integrated to meet the requirements for protection of data over the Internet. This study investigates and critically analyses various existing cover steganography techniques and identifies the valuable region that everyone can be benefited. Moreover, we present a comprehensive overview of the fundamental concepts with in the domain of the steganographic methods and steganalysis. These systems have been depicted in numerous areas of the steganography such as spatial space, transform domain, and adaptive space. Moreover, each space has its particular traits. A few regularly involved techniques for improving the steganographic security and upgrading steganalysis capacity are elaborated, summed up; and conceivable examination patterns are talked about. We also systematically separate different methodologies in our review and show their pros and cons, qualities, challenges and significance.
CITATION STYLE
Rahman, S., Uddin, J., Zakarya, M., Hussain, H., Khan, A. A., Ahmed, A., & Haleem, M. (2023). A Comprehensive Study of Digital Image Steganographic Techniques. IEEE Access, 11, 6770–6791. https://doi.org/10.1109/ACCESS.2023.3237393
Mendeley helps you to discover research relevant for your work.