Loading

Image Steganography: Critical Findings through Some Novel Techniques
Farooq Nabi1, M. Mazhar Afzal2

1Mr. Farooq Nabi*, Research Scholar, Department of Computer Engineering, Glocal University, Saharanpur, Uttar Pradesh, India.
2Dr. M. Mazhar Afzal, Research Guide, Associate Professor & HOD of Computer Engineering Glocal University Saharanpur, Uttar Pradesh, India.
Manuscript received on February 10, 2020. | Revised Manuscript received on February 25, 2020. | Manuscript published on March 10, 2020. | PP: 878-890 | Volume-9 Issue-5, March 2020. | Retrieval Number: E2634039520/2020©BEIESP| DOI: 10.35940/ijitee.E2634.039520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Word ’Steganography’ is originated from Greekand has been used in several forms for 2500 years which is a art of hiding confidential data in any digital manner in such a way that no one can concealed it. It has found practise in various section like in military, government, diplomatic, medical, personal and intelligence agencies. This survey paper put the light on the basic of image steganography along with its different techniques and sub-techniques. Cover selection with recent trend ROI (region Of Interest) is highlighted. In addition, different types of Image file used in image steganography and performance parameter are discuss well. 
Keywords: Image Steganography, Cover Selection, PSNR.
Scope of the Article: Image Analysis and Processing