Steganography embeds an image within another cover image in such a way that the intruder cannot identify the existence of the input image from the embedded image [2].
There are two important factors that every successful and powerful
steganography system should take into consideration; these factors are the hiding efficiency and the hiding payload.
(2014) Principles and Overview of Network
Steganography. IEEE Communication Magazine, 52, 225-229.
Image
steganography is the driving force among the
steganography algorithms that make use of different multimedia carriers since the image is the most common form that is shared and transferred in both social media and e-mail environments.
Steganography is the art of information hiding (Siper & al, 2005).
4
STEGANOGRAPHY USING GRAPH COLORING AND PIXELS CORRELATION
Atta-ur-Rahman Naseem, "Changing Slope Method: A Novel Technique for Digital Audio
Steganography," J.
Figure 1 shows the basic schematic of the
steganography process.
Zhang and Wang [21] proposed exploiting modification direction (EMD)
steganography. The main goal in it is that a group of secret bits is converted to a digit in (2n+1)-ary notational system, where n is the size of pixel block.
Steganography has its own mechanism in data protecting [1, 2].
In recent years, many methods have been proposed for
steganography and steganalysis, such as coverless information hiding [9],
steganography, and steganalysis based on deep learning [10,11].
Thus, it is established that both cryptography and
steganography together can used to protect medical information in digital form.