Abstract
Steganography is the art and science of invisible communication. It has recently been the core of attention by the information-security community. This chapter is concerned with summarizing the conclusions that have been arrived at throughout conducting the present work. It further showcases some possible future research challenges that need to be studied in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdul-mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. Procedia Engineering Journal, 53, 463–471.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b, April). Characteristic Region Based Image Steganography Using Speeded-Up Robust Features Technique. Paper presented at the 1st International Conference on Future Communication Network (ICFCN’12). IEEE international conference, Iraq, Baghdad.
Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences, 7(1), 35–55.
Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.
Kundur, D., & Hatzinakos, D. (1998). Towards a telltale watermarking technique for tamper-proofing. Image Processing, 1998. ICIP 98. Proceedings,Chicago, IL, USA.
Mali, S. N., Patil, P. M., & Jalnekar, R. M. (2012). Robust and secured image-adaptive data hiding. Digital Signal Processing: A Review Journal, 22(2), 314–323.
Reed, I. S., & Solomon, G. (1960). Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2), 300–304.
Zhicheng, N., Yun-Qing, S., Ansari, N., & Wei, S. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Yahya, A. (2019). Conclusion Toward Hidden Communication. In: Steganography Techniques for Digital Images. Springer, Cham. https://doi.org/10.1007/978-3-319-78597-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-78597-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78535-6
Online ISBN: 978-3-319-78597-4
eBook Packages: EngineeringEngineering (R0)