A Survey on Image Data Hiding Techniques | ||||
International Journal of Intelligent Computing and Information Sciences | ||||
Article 15, Volume 22, Issue 3, August 2022, Page 14-38 PDF (1.57 MB) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/ijicis.2022.130393.1174 | ||||
![]() | ||||
Authors | ||||
Mahmoud Magdy Mohamed ![]() ![]() ![]() | ||||
1Mahmoud Magdy1* 1 Department of Digital media Technology, Future University in Egypt (FUE) New Cairo, Egypt. | ||||
2Prof at Faculty of Computer & Information Sciences, Computer Systems Department, Ain Shams University, Cairo , Egypt. | ||||
3Neveen I. Ghali, Department of Digital media Technology, Future University in Egypt (FUE) New Cairo, Egypt. | ||||
Abstract | ||||
Due to the observed growth in recent years of digital image communication, computer technologies, and image processing techniques image security has been an essential demand due to the different image attacks. Image security approaches are classified into cryptography and data hiding techniques, including digital watermarking and steganography. This study paper reviews existing picture data hiding techniques, their benefits and drawbacks, and future research directions. In addition to the survey, we included a brief explanation of several geometric and image processing attacks that impair picture transmission. General multimedia security ideas, primary requirements, and recent applications We addressed various approaches and their characteristics, types, requirements, and working mechanisms. We classify the techniques based on different domains. General concepts of data hiding approaches, their characteristics, recent applications used in, also recent research work for proposed techniques is discussed in the following sections, finally, a comparison between different methodologies has been presented in a table. | ||||
Keywords | ||||
Watermarking; Steganography; Attacks; Copyright; Spatial domain | ||||
Statistics Article View: 308 PDF Download: 383 |
||||