Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Vol 7 No 4 (2023): Volume 7, Issue 4, April 2023 | Pages: 1-6
International Research Journal of Innovations in Engineering and Technology
OPEN ACCESS | Research Article | Published Date: 06-04-2023
Because of the great development taking place in the field of information transfer, media, and the Internet, which has become an essential thing in daily life, it has become necessary to provide ways to protect this information and data while transferring it from one place to another. One of the most important ways to provide this protection is to hide confidential information from unwanted people using steganography, which is a science / art to hide confidential information in a way that makes the attacker believe that the message does not exist at all, by hiding it inside a digital medium (image, audio, video) so that it is difficult to detect. In this review, a new method was proposed to hide confidential data using quad chain code (QCC) that detects the edges of the object in the image so that the secret data is hidden in these edges by using one of the well-known hiding techniques such as the LSB and then using the shearlet transformation to convert the medium that contains the secret message from one domain to another domain in order to complicate the process of retrieval and disclosure of the secret message to the attacker.
Steganography, Chain codes, Object boundary, DST
Maha Monther Mohamed Fathel, Ahmed Sami Nori, “Review "An Evaluation Review of Steganography Using a Hybrid Method Technique of Quad Chain Code and Discrete Shearlet Transform"” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 4, pp 1-6, April 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.704001
This work is licensed under Creative common Attribution Non Commercial 4.0 Internation Licence