Conclusion Toward Hidden Communication
Steganography is the art and science of invisible communication. It has recently been the core of attention by the information-security community. This chapter is concerned with summarizing the conclusions that have been arrived at throughout conducting the present work. It further showcases some possible future research challenges that need to be studied in this area.
- Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.Google Scholar
- Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b, April). Characteristic Region Based Image Steganography Using Speeded-Up Robust Features Technique. Paper presented at the 1st International Conference on Future Communication Network (ICFCN’12). IEEE international conference, Iraq, Baghdad.Google Scholar
- Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences, 7(1), 35–55.Google Scholar
- Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.Google Scholar
- Kundur, D., & Hatzinakos, D. (1998). Towards a telltale watermarking technique for tamper-proofing. Image Processing, 1998. ICIP 98. Proceedings,Chicago, IL, USA.Google Scholar