Advertisement

Conclusion Toward Hidden Communication

  • Abid Yahya
Chapter

Abstract

Steganography is the art and science of invisible communication. It has recently been the core of attention by the information-security community. This chapter is concerned with summarizing the conclusions that have been arrived at throughout conducting the present work. It further showcases some possible future research challenges that need to be studied in this area.

References

  1. Abdul-mahdi, N. H., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2013). Secured and robust information hiding scheme. Procedia Engineering Journal, 53, 463–471.CrossRefGoogle Scholar
  2. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012a). Image steganography techniques: An overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–178.Google Scholar
  3. Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012b, April). Characteristic Region Based Image Steganography Using Speeded-Up Robust Features Technique. Paper presented at the 1st International Conference on Future Communication Network (ICFCN’12). IEEE international conference, Iraq, Baghdad.Google Scholar
  4. Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013a). Steganography in image files: A survey. Australian Journal of Basic and Applied Sciences, 7(1), 35–55.Google Scholar
  5. Hamid, N., Yahya, A., Ahmad, R. B., Najim, D., & Kanaan, L. (2013b). Enhancing the robustness of digital image steganography using ECC and redundancy. WULFENIA Journal, 20(4), 153–169.Google Scholar
  6. Kundur, D., & Hatzinakos, D. (1998). Towards a telltale watermarking technique for tamper-proofing. Image Processing, 1998. ICIP 98. Proceedings,Chicago, IL, USA.Google Scholar
  7. Mali, S. N., Patil, P. M., & Jalnekar, R. M. (2012). Robust and secured image-adaptive data hiding. Digital Signal Processing: A Review Journal, 22(2), 314–323.MathSciNetCrossRefGoogle Scholar
  8. Reed, I. S., & Solomon, G. (1960). Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2), 300–304.MathSciNetCrossRefGoogle Scholar
  9. Zhicheng, N., Yun-Qing, S., Ansari, N., & Wei, S. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354.CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Abid Yahya
    • 1
  1. 1.Faculty of Engineering & TechnologyBotswana International University of Science and TechnologyPalapyeBotswana

Personalised recommendations