IMAGE STEGANOGRAPHY

Authors

  • Ruchi Iche Computer Science & Engg, STC, Khamgaon
  • Ankita Satao Computer Science & Engg, STC, Khamgaon
  • Ashwini Ingle Computer Science & Engg, STC, Khamgaon
  • Chayya Wanare Computer Science & Engg, STC, Khamgaon

Keywords:

cryptography,steganography, image steganography.

Abstract

Steganography is the art of hiding information in other information. It is one of the methods used for the hidden
exchange of information and it can be defined as the study of invisible communication that usually deals with the ways of
hiding the existence of the communicated message. Steganography is the process of hiding a secret message within a larger
one in such a way that someone cannot know the presence or contents of the hidden message. There is a key object that will
‘carry’ the hidden message. Many different carrier file formats can be used, but digital images are the most popular because
of their frequency on the internet. Many carrier can be referred to a digital image, an mp3, even a paintings and among and
etc. A key is used to decode/discover the hidden message. For hiding secret information in jpg format, there exists large
variety of steganography techniques some are more complex than others and all of have both strong and weak points. In this
way, if successfully steganography is achieved, the message does not attract attention from attackers and hackers. Using
steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images,
audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the
taxonomy of current steganographyc techniques for image files has been presented. These all techniques are referred and
used and far discussed not only in terms of their ability to providing security to information in image files but also according
to how much information can be hidden, and the robustness or toughness to different image processing attacks. This paper is
present to give an overview of image steganography, and know its uses and techniques.

Published

2022-08-23

How to Cite

Ruchi Iche, Ankita Satao, Ashwini Ingle, & Chayya Wanare. (2022). IMAGE STEGANOGRAPHY. International Journal of Advance Engineering and Research Development (IJAERD), 5(18), -. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/6409