Back to Search
Start Over
Review on various image protection methods.
- Source :
- Journal of Qadisiyah Computer Science & Mathematics; 2023, Vol. 15 Issue 4, p41-47, 7p
- Publication Year :
- 2023
-
Abstract
- The security of information exchange over email and other web-based means is rather low, and there is the risk of interception when it comes to confidential information (e.g., credit card info). Therefore, online users should be ensured of the security and privacy of their web interactions. Despite the remarkable benefits of the Internet in the modern era and its contribution to digital communication, the information security of open networks has become an important issue due to its heavy costs. Several approaches have been used to address this issue, particularly through information hiding and encryption in system security strategies. Cryptography is the process of information encryption, and steganography refers to information hiding. These methods have proven quite effective in maintaining information security. Cryptography involves making changes to confidential information, which prevents their readability by eavesdroppers, which could also be considered a technique of original text to cipher text. On the other hand, steganography entirely hides confidential information from unauthorized users using multiple carrier formats, including audio, video, protocol, and images. Given the availability of digital images, they are often employed as carrier files online. Other approaches to image steganography are also common and have specific limitations and advantages. The present study aimed to review different methods of image cryptography and steganography and compare the studies in this regard so as to determine which the best, specific and accurate methods of information security. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 20740204
- Volume :
- 15
- Issue :
- 4
- Database :
- Complementary Index
- Journal :
- Journal of Qadisiyah Computer Science & Mathematics
- Publication Type :
- Academic Journal
- Accession number :
- 175494270
- Full Text :
- https://doi.org/10.29304/jqcsm.2023.15.41364