embeds an image within another cover image in such a way that the intruder cannot identify the existence of the input image from the embedded image .
There are two important factors that every successful and powerful steganography
system should take into consideration; these factors are the hiding efficiency and the hiding payload.
(2014) Principles and Overview of Network Steganography
. IEEE Communication Magazine, 52, 225-229.
is the driving force among the steganography
algorithms that make use of different multimedia carriers since the image is the most common form that is shared and transferred in both social media and e-mail environments.
is the art of information hiding (Siper & al, 2005).
USING GRAPH COLORING AND PIXELS CORRELATION
Atta-ur-Rahman Naseem, "Changing Slope Method: A Novel Technique for Digital Audio Steganography
Figure 1 shows the basic schematic of the steganography
Zhang and Wang  proposed exploiting modification direction (EMD) steganography
. The main goal in it is that a group of secret bits is converted to a digit in (2n+1)-ary notational system, where n is the size of pixel block.
has its own mechanism in data protecting [1, 2].
In recent years, many methods have been proposed for steganography
and steganalysis, such as coverless information hiding , steganography
, and steganalysis based on deep learning [10,11].
Thus, it is established that both cryptography and steganography
together can used to protect medical information in digital form.