Survey steganography applications

Authors

  • Eng. Saad Nasser Al.Azzam Cyber Security Researcher, Faculty of Computing and Information Technology, University of Bisha Saudi Arabia
  • Dr. Abdelmageed Algamdi Computer Science, Department of Computer and Information Systems, University of Bisha Saudi Arabia

DOI:

https://doi.org/10.55145/ajest.2023.01.01.008

Keywords:

: Carrier, Privacy, Secrecy, Steganalysis, Steganography

Abstract

There are many and many ways that play an important role in terms of information security, including the most common method known as cryptography, which is changing/hiding the basic data according to a certain method to make it unreadable. Steganography is another art that aims to completely hide data to communicate between two parties unobtrusively to a third party, and this is known as steganography. Only the relevant persons are aware of this contact. The practice of steganography includes concealing a message inside a suitable carrier, such as a picture or an audio file, for example. Steganography is also known as cryptography. The carrier may then be delivered to the intended recipient with no one except the intended recipient being aware that it conceals a message. For instance, civil rights organizations in repressive countries may utilize this strategy to get their message out to the globe without raising suspicion at home. This is due to the fact that it is possible to use this strategy in private. In this piece, we've attempted to explain the many steps involved in using a "multimedia" file to create steganography (text, static image, audio, and video). Stainless is an emerging area of data science that tries to detect steganographic masks and, if possible, retrieve hidden communications. Stainless is an emerging industry. It's extremely similar to cryptanalysis, which is used in the field of cryptography. The technique has been around for quite some time, but it has only recently gained widespread notice because of its application to the secure transmission of digital information. The primary objective is to conceal the existence of the communication, as well as to prevent it from being read.

Downloads

Published

2022-12-03

How to Cite

Al.Azzam , E. S. N. ., & Algamdi , D. A. . . (2022). Survey steganography applications. Al-Salam Journal for Engineering and Technology, 2(1), 69–75. https://doi.org/10.55145/ajest.2023.01.01.008

Issue

Section

Articles