Advancements in Modern Steganography Techniques for Enhanced Data Security: A Comprehensive Review

Information security has become a major concern in today's digital world with the rapid growth of the internet. To confront this challenge, various techniques like cryptography and steganography have developed in the fields of computer security for protecting sensitive data from unauthorized ac...

Full description

Saved in:
Bibliographic Details
Published in2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) pp. 941 - 944
Main Authors Bohra, Shresty, Naik, Charmi, Batra, Rashi, Popat, Kinshu, Kaur, Hargeet
Format Conference Proceeding
LanguageEnglish
Published Bharati Vidyapeeth, New Delhi 28.02.2024
Subjects
Online AccessGet full text
DOI10.23919/INDIACom61295.2024.10498587

Cover

Abstract Information security has become a major concern in today's digital world with the rapid growth of the internet. To confront this challenge, various techniques like cryptography and steganography have developed in the fields of computer security for protecting sensitive data from unauthorized access. The review paper explores modern steganography techniques, providing valuable information about their applications in data security. It analyzes the emerging field of DNA-based steganography. The paper also examines the dynamic domain of audio steganography, focusing on the challenge of developing strong, high-capacity systems for secure communication. Additionally, it focuses on evaluation of digital image steganography methods.
AbstractList Information security has become a major concern in today's digital world with the rapid growth of the internet. To confront this challenge, various techniques like cryptography and steganography have developed in the fields of computer security for protecting sensitive data from unauthorized access. The review paper explores modern steganography techniques, providing valuable information about their applications in data security. It analyzes the emerging field of DNA-based steganography. The paper also examines the dynamic domain of audio steganography, focusing on the challenge of developing strong, high-capacity systems for secure communication. Additionally, it focuses on evaluation of digital image steganography methods.
Author Batra, Rashi
Bohra, Shresty
Naik, Charmi
Kaur, Hargeet
Popat, Kinshu
Author_xml – sequence: 1
  givenname: Shresty
  surname: Bohra
  fullname: Bohra, Shresty
  email: shresty73@gmail.com
  organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India
– sequence: 2
  givenname: Charmi
  surname: Naik
  fullname: Naik, Charmi
  email: charminaik27@gmail.com
  organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India
– sequence: 3
  givenname: Rashi
  surname: Batra
  fullname: Batra, Rashi
  email: rashibatra78@gmail.com
  organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India
– sequence: 4
  givenname: Kinshu
  surname: Popat
  fullname: Popat, Kinshu
  email: kinshu.pce21@sot.pdpu.ac.in
  organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India
– sequence: 5
  givenname: Hargeet
  surname: Kaur
  fullname: Kaur, Hargeet
  email: hargeet.kaur13@gmail.com
  organization: Pandit Deendayal Energy University,Computer Science Engineering,Gandhinagar,India
BookMark eNo1j8FPgzAchWuiB537Dzz04BVsaUtbb4RNJZmauHleCv0xmkjBwjD8986op3d63_veFTr3nQeEbimJE6apviteVkWWd21KEy3ihCQ8poRrJZQ8Q0stlWaKCM4F1ZeozOxkfAUt-HHAzuPnzkLweDvCwfjuEEzfzHgHVePd5xEGXHcBr33z07F4ZUaDt1Adgxvne5zh02wfoAE_uAnwG0wOvq7RRW0-Blj-5QK9P6x3-VO0eX0s8mwTOUr1GPGSnVSNKLXViTBWsxQopIRzzqw0jJXSSAmpIqSEsuaGVJxwWlNGlWWEsAW6-eU6ANj3wbUmzPv_6-wbVttViA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.23919/INDIACom61295.2024.10498587
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEL
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9789380544519
9380544510
EndPage 944
ExternalDocumentID 10498587
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-4b3024a5b9d925ad936e1e604443d7a33b7a77e6800bebf4a0c4041f1318d3003
IEDL.DBID RIE
IngestDate Wed May 01 11:49:10 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-4b3024a5b9d925ad936e1e604443d7a33b7a77e6800bebf4a0c4041f1318d3003
PageCount 4
ParticipantIDs ieee_primary_10498587
PublicationCentury 2000
PublicationDate 2024-Feb.-28
PublicationDateYYYYMMDD 2024-02-28
PublicationDate_xml – month: 02
  year: 2024
  text: 2024-Feb.-28
  day: 28
PublicationDecade 2020
PublicationTitle 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom)
PublicationTitleAbbrev INDIACom
PublicationYear 2024
Publisher Bharati Vidyapeeth, New Delhi
Publisher_xml – name: Bharati Vidyapeeth, New Delhi
Score 1.9217811
Snippet Information security has become a major concern in today's digital world with the rapid growth of the internet. To confront this challenge, various techniques...
SourceID ieee
SourceType Publisher
StartPage 941
SubjectTerms Audio steganography
Computer security
Cracking probability
Digital images
Discrete Cosine Transform
DNA
DNA steganography
Focusing
Image steganography
Information security
LSB
Prisoners'problem
Reviews
RGB
SNR
Steganography
Stego-Image
Temporal Domain
Transform Domain
Title Advancements in Modern Steganography Techniques for Enhanced Data Security: A Comprehensive Review
URI https://ieeexplore.ieee.org/document/10498587
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7Og3hSceJvctg1dWnSpvE23MYmOIRtsNtI0tQNoZPZXfzrfUlaRUHwVgr9wXt5fa953_c9hDomFl0nAEm4LGICi0KRjKaWxG63gdHEGi8p9DRJR3P-uEgWNVndc2GstR58ZiN36Hv5-cbs3FYZRDiXWZKJFmrBOgtkrQPU8XBmSeXdeNIf9yCOIGvLBP79Yh41l_wYnuJzx_AITZqnBsjIa7SrdGQ-fgky_vu1jlH7m6aHn78S0Anas-Up0r3Q1ffUNbwucZh2hqeVfVFlLVCNZ4106zuGqhUPypVHAuC-qhSe1jPt7nEPu-_F1q4CzB2HTkIbzYeD2cOI1IMUyJpSWRGuGdhCJVrmEryRS5ZaalMnFcdyoRjTQglhUygetdUFV13Du5wWFAI-ZxD3Z2i_3JT2HGFTGJoZIUQRSx7HcEeWFZTmUKQbAeXLBWo7Ay3fglbGsrHN5R_nr9Ch81MgiV-j_Wq7szeQ5it96937CZ0Hp8E
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA46QX1SceJv87DX1qVNm8a34SabbkXYBnsbSZq6IXQyuxf_ei9JqygIvpVCf3CX611z3_cdQi0VsLYRgPQozwMPFoXwEhJrLzC7DSGJtLKSQqM07k_p4yyaVWR1y4XRWlvwmfbNoe3lZyu1MVtlEOGUJ1HCttEOJH4aObrWLmpZQDMn_HaQdgcdiCTI2zyCv7-A-vVFP8an2OzxcIDS-rkONPLqb0rpq49fkoz_frFD1Pwm6uHnrxR0hLZ0cYxkx_X1LXkNLwvs5p3hcalfRFFJVONJLd76jqFuxb1iYbEAuCtKgcfVVLs73MHmi7HWCwd0x66X0ETTh97kvu9VoxS8JSG89KgMwRYikjzj4I-Mh7EmOjZicWHGRBhKJhjTMZSPUsuciraibUpyAiGfhRD5J6hRrAp9irDKFUkUYywPOA0CuGOY5IRkUKYrBgXMGWoaA83fnFrGvLbN-R_nb9BefzIazoeD9OkC7RufOcr4JWqU642-gqRfymvr6k-TbKsO
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+11th+International+Conference+on+Computing+for+Sustainable+Global+Development+%28INDIACom%29&rft.atitle=Advancements+in+Modern+Steganography+Techniques+for+Enhanced+Data+Security%3A+A+Comprehensive+Review&rft.au=Bohra%2C+Shresty&rft.au=Naik%2C+Charmi&rft.au=Batra%2C+Rashi&rft.au=Popat%2C+Kinshu&rft.date=2024-02-28&rft.pub=Bharati+Vidyapeeth%2C+New+Delhi&rft.spage=941&rft.epage=944&rft_id=info:doi/10.23919%2FINDIACom61295.2024.10498587&rft.externalDocID=10498587