Image Steganography – An Overview

Research Article
Neelam Suryakant Chavan
DOI: 
xxx-xxxx-xxxx
Subject: 
Science
KeyWords: 
Steganography, Imperceptibility, Robustness, Security, Cover, Entropy, Bit data hiding, information, Payload, Stegoimage, attacker, data embedding, Cryptography, Transform Domain, Compression.
Abstract: 

There exist a wide range of protocols for hiding message in images. However, without leaving any apparent evidence of image alteration, security and robustness will be the key attributes of any particular technique. Many attacks to security constitute a first step towards performing attacks to robustness. In this paper, we demonstrate an algorithm to make the data embedding process as robust as possible. Starting form proper selection of images, blocks within the image and coefficients within the block this algorithm gives an idea of making the embedding process robust. Experimental results show an improvement as we follow this algorithm.