ملف المستخدم
صورة الملف الشخصي

عمر عبد نجم

إرسال رسالة

التخصص: امنية معلومات

الجامعة: جامعة الموصل

النقاط:

2.5
معامل الإنتاج البحثي

الخبرات العلمية

  • مسؤول وحدة

الأبحاث المنشورة

Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey

المجلة: Al-Rafidain Journal of Computer Sciences and Mathematics (RJCM)

سنة النشر: 2024

تاريخ النشر: 2024-06-25

Steganography is considered as one of the most important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in image Steganography was accomplished to insert a message into a cover image (as the transferor to insert message into) and create a stego-image. More precisely, steganography uses over non-secret data to hide secret data and it is not able to be deleted, such as image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. Therefore, its job is to hide data in bits that epitomize the identical color pixels recurrent in a row of an image file. This research aims critically to analyze various stenographic techniques and covers steganography literature. Moreover, it supports the apprehensive developers to understand the limitations of most popular techniques to be used based on stenography techniques.