ABSTRACT

This chapter describes steganography techniques, and covers the advantages and disadvantages of steganography in information security. Both steganography and cryptography are used for concealing information. Cryptography is used to change the form of the data. Steganography techniques are based on replacing bits of useless data with bits of important information. There are three methods of steganography: pure steganography, secret key steganography, and public key steganography. Modern researchers oriented their aims toward using chaotic maps in steganography to improve the security aspects resulting in a hybrid security system, and also to increase the cryptanalytic efforts that must be paid to cryptanalysis of the complete hybrid (crypto–stego) system. The chapter classifies research of chaos in steganography into three categories namely: chaotic maps used as steganography key, chaotic maps used as cryptography key and chaotic maps that use a hybrid of steganography and cryptography keys.