Table of Content

Open Access iconOpen Access

ARTICLE

A Survey on Digital Image Steganography

Jiaxin Wang1,*, Mengxin Cheng1, Peng Wu1, Beijing Chen1,2

School of Computer & Software, Nanjing University of Information Science & Technology, Nanjing, 210044, China.
Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, Nanjing University of Information Science & Technology, Nanjing, 210044, China.

*Corresponding Author: Jiaxin Wang. Email: email.

Journal of Information Hiding and Privacy Protection 2019, 1(2), 87-93. https://doi.org/10.32604/jihpp.2019.07189

Abstract

Internet brings us not only the convenience of communication but also some security risks, such as intercepting information and stealing information. Therefore, some important information needs to be hidden during communication. Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms. Moreover, their advantages and weaknesses are pointed out. Finally, further research directions are discussed.

Keywords


Cite This Article

APA Style
Wang, J., Cheng, M., Wu, P., Chen, B. (2019). A survey on digital image steganography. Journal of Information Hiding and Privacy Protection, 1(2), 87-93. https://doi.org/10.32604/jihpp.2019.07189
Vancouver Style
Wang J, Cheng M, Wu P, Chen B. A survey on digital image steganography. J Inf Hiding Privacy Protection . 2019;1(2):87-93 https://doi.org/10.32604/jihpp.2019.07189
IEEE Style
J. Wang, M. Cheng, P. Wu, and B. Chen "A Survey on Digital Image Steganography," J. Inf. Hiding Privacy Protection , vol. 1, no. 2, pp. 87-93. 2019. https://doi.org/10.32604/jihpp.2019.07189

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 3915

    View

  • 2185

    Download

  • 2

    Like

Related articles

Share Link