Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey

Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in image Steganography was accomplished to insert a message into a cover image (as the transferor to insert...

Full description

Saved in:
Bibliographic Details
Main Authors: Omar Abed Najm, Ahmed Nori
Format: Article
Language:English
Published: Mosul University 2024-06-01
Series:Al-Rafidain Journal of Computer Sciences and Mathematics
Subjects:
Online Access:https://csmj.mosuljournals.com/article_183932_f62573f8a7de94792a856d581b199061.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849738601429991424
author Omar Abed Najm
Ahmed Nori
author_facet Omar Abed Najm
Ahmed Nori
author_sort Omar Abed Najm
collection DOAJ
description Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in image Steganography was accomplished to insert a message into a cover image (as the transferor to insert message into) and create a stegoimage. More precisely, steganography is using over non-secret data to be hiding secret data and not able to be deleted, such as image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. Therefore, its job is to hide data in bits that epitomize the identical color pixels recurrent in a row of an image file. This research aims critically to analyze various stenographic techniques and covers steganography literature. Also, it supports the apprehensive developers to understand the limitations of most popular techniques to be used based on stenography techniques.
format Article
id doaj-art-ee3eeb0899844311b2c3f8b6293a8623
institution DOAJ
issn 1815-4816
2311-7990
language English
publishDate 2024-06-01
publisher Mosul University
record_format Article
series Al-Rafidain Journal of Computer Sciences and Mathematics
spelling doaj-art-ee3eeb0899844311b2c3f8b6293a86232025-08-20T03:06:31ZengMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics1815-48162311-79902024-06-0118112513010.33899/csmj.2024.149422.1123183932Steganography Traditional Methods and M2PAM in Social Media Environments: A SurveyOmar Abed Najm0Ahmed Nori1Department of Cyber-Security, College of Computer Science and Mathematics, University of Mosul, Nineveh, IraqDepartment of Cyber-Security, College of Computer Science and Mathematics, University of Mosul, Nineveh, IraqSteganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in image Steganography was accomplished to insert a message into a cover image (as the transferor to insert message into) and create a stegoimage. More precisely, steganography is using over non-secret data to be hiding secret data and not able to be deleted, such as image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. Therefore, its job is to hide data in bits that epitomize the identical color pixels recurrent in a row of an image file. This research aims critically to analyze various stenographic techniques and covers steganography literature. Also, it supports the apprehensive developers to understand the limitations of most popular techniques to be used based on stenography techniques.https://csmj.mosuljournals.com/article_183932_f62573f8a7de94792a856d581b199061.pdfsteganographywebp imagesocial media security
spellingShingle Omar Abed Najm
Ahmed Nori
Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
Al-Rafidain Journal of Computer Sciences and Mathematics
steganography
webp image
social media security
title Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
title_full Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
title_fullStr Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
title_full_unstemmed Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
title_short Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
title_sort steganography traditional methods and m2pam in social media environments a survey
topic steganography
webp image
social media security
url https://csmj.mosuljournals.com/article_183932_f62573f8a7de94792a856d581b199061.pdf
work_keys_str_mv AT omarabednajm steganographytraditionalmethodsandm2paminsocialmediaenvironmentsasurvey
AT ahmednori steganographytraditionalmethodsandm2paminsocialmediaenvironmentsasurvey