Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in image Steganography was accomplished to insert a message into a cover image (as the transferor to insert...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2024-06-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_183932_f62573f8a7de94792a856d581b199061.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849738601429991424 |
|---|---|
| author | Omar Abed Najm Ahmed Nori |
| author_facet | Omar Abed Najm Ahmed Nori |
| author_sort | Omar Abed Najm |
| collection | DOAJ |
| description | Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in image Steganography was accomplished to insert a message into a cover image (as the transferor to insert message into) and create a stegoimage. More precisely, steganography is using over non-secret data to be hiding secret data and not able to be deleted, such as image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. Therefore, its job is to hide data in bits that epitomize the identical color pixels recurrent in a row of an image file. This research aims critically to analyze various stenographic techniques and covers steganography literature. Also, it supports the apprehensive developers to understand the limitations of most popular techniques to be used based on stenography techniques. |
| format | Article |
| id | doaj-art-ee3eeb0899844311b2c3f8b6293a8623 |
| institution | DOAJ |
| issn | 1815-4816 2311-7990 |
| language | English |
| publishDate | 2024-06-01 |
| publisher | Mosul University |
| record_format | Article |
| series | Al-Rafidain Journal of Computer Sciences and Mathematics |
| spelling | doaj-art-ee3eeb0899844311b2c3f8b6293a86232025-08-20T03:06:31ZengMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics1815-48162311-79902024-06-0118112513010.33899/csmj.2024.149422.1123183932Steganography Traditional Methods and M2PAM in Social Media Environments: A SurveyOmar Abed Najm0Ahmed Nori1Department of Cyber-Security, College of Computer Science and Mathematics, University of Mosul, Nineveh, IraqDepartment of Cyber-Security, College of Computer Science and Mathematics, University of Mosul, Nineveh, IraqSteganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in image Steganography was accomplished to insert a message into a cover image (as the transferor to insert message into) and create a stegoimage. More precisely, steganography is using over non-secret data to be hiding secret data and not able to be deleted, such as image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. Therefore, its job is to hide data in bits that epitomize the identical color pixels recurrent in a row of an image file. This research aims critically to analyze various stenographic techniques and covers steganography literature. Also, it supports the apprehensive developers to understand the limitations of most popular techniques to be used based on stenography techniques.https://csmj.mosuljournals.com/article_183932_f62573f8a7de94792a856d581b199061.pdfsteganographywebp imagesocial media security |
| spellingShingle | Omar Abed Najm Ahmed Nori Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey Al-Rafidain Journal of Computer Sciences and Mathematics steganography webp image social media security |
| title | Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey |
| title_full | Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey |
| title_fullStr | Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey |
| title_full_unstemmed | Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey |
| title_short | Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey |
| title_sort | steganography traditional methods and m2pam in social media environments a survey |
| topic | steganography webp image social media security |
| url | https://csmj.mosuljournals.com/article_183932_f62573f8a7de94792a856d581b199061.pdf |
| work_keys_str_mv | AT omarabednajm steganographytraditionalmethodsandm2paminsocialmediaenvironmentsasurvey AT ahmednori steganographytraditionalmethodsandm2paminsocialmediaenvironmentsasurvey |