Back to Search Start Over

Review on various image protection methods.

Authors :
Abdulkadhim, Ekhlas Ghaleb
Dhahi, Sanaa Hammad
Al-Shemarry, Meeras Salman
Source :
Journal of Qadisiyah Computer Science & Mathematics; 2023, Vol. 15 Issue 4, p41-47, 7p
Publication Year :
2023

Abstract

The security of information exchange over email and other web-based means is rather low, and there is the risk of interception when it comes to confidential information (e.g., credit card info). Therefore, online users should be ensured of the security and privacy of their web interactions. Despite the remarkable benefits of the Internet in the modern era and its contribution to digital communication, the information security of open networks has become an important issue due to its heavy costs. Several approaches have been used to address this issue, particularly through information hiding and encryption in system security strategies. Cryptography is the process of information encryption, and steganography refers to information hiding. These methods have proven quite effective in maintaining information security. Cryptography involves making changes to confidential information, which prevents their readability by eavesdroppers, which could also be considered a technique of original text to cipher text. On the other hand, steganography entirely hides confidential information from unauthorized users using multiple carrier formats, including audio, video, protocol, and images. Given the availability of digital images, they are often employed as carrier files online. Other approaches to image steganography are also common and have specific limitations and advantages. The present study aimed to review different methods of image cryptography and steganography and compare the studies in this regard so as to determine which the best, specific and accurate methods of information security. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
20740204
Volume :
15
Issue :
4
Database :
Complementary Index
Journal :
Journal of Qadisiyah Computer Science & Mathematics
Publication Type :
Academic Journal
Accession number :
175494270
Full Text :
https://doi.org/10.29304/jqcsm.2023.15.41364