IMAGE STEGANOGRAPHY REVIEW1. INTRODUCTIONWith the rapid development of computer technologies and the Internet, you can get any information through the Internet very easily. Transferring or transmitting a message from one point to another is also very convenient in today's era. People who have the Internet and a computer can get any kind of information related to any field without any difficulty [1]. While transferring or communicating over the Internet remains an issue, safety and security. Steganography schemes are used to eliminate these types of security issues. The standard phrase "What you see is what you get (WYSIWYG)" is not true if there is misuse or hacking. You can transfer secret information over the Internet using steganography schemes very easily.1.1 NomenclatureSteganography is the word derived from the Greek word Steganos, meaning "Covered" and graphy means "writing". Steganography is a technique used to hide data such that the existence of hidden data is unknown. The original files can be called cover text, cover image or cover audio. The medium through which information is hidden is Stego Medium. Steganalysis is the identification of the existence of the message.1.2 Origin of SteganographyThe origin of steganography dates back to the Greeks in 500 BC They use slaves as a medium to send the hidden message. The slave's head was shaved and the secret message was tattooed on the skull, after which the hair was allowed to grow back. The slave is then sent to the destination who shaves his head and reads the hidden message. This method is not dependent on time. The next strategies used by the Greeks are stuffed rabbits and wax tables. In the Middle Ages, that is, between 1400 and 1600 AD, the concept of biliteral cipher... half of the paper... techniques", Conference of the Northeast Section of the ASEE[2]. Streetman Kibbee D.,----- -,”The Art of Secret Communication Steganography”----------[3]. Ashok Jammi, Raju Y., S.Munishankaraiah, K.Srinivas, 2010, "Steganography: An Overview", International Journal of Engineering Science and Technology, vol. 2, no. 10, pp. 5985-5992.[4]. reversible image steganography via predictive coding", View Elsevier, vol. 31, no. 1, pp. 35-43.[5]. Chugh Gunjan, 2013, "Image steganography techniques: a review article", ACTA technical corviniensis-Bulletin of Engineering, vol ] Joshi Saurabh V., Bakil Ajinkya A., Jain Nikhil A., Koshti Deepali,2012,”Combination Image Steganography of spatial and frequency domain”, International Journal of Computer Applications, vol. 53, no. 5, pp. 25-29.
tags