Among many variations of steganographic
techniques already proposed, the technique proposed in  directly hides the image by replacing the LSBs of each pixel of the cover image.
Argue that the majority of the popular steganographic
techniques are designed to eliminate distortion, and thus they have some similarity with the models in the distortion category.
Many of the existing steganographic
methods for HTTP/1.x are suppressed in HTTP/2, by design.
In the study  the authors proposed a variable-sized steganographic
algorithm based on a single 2-D chaotic map.
[2.] Mohis, M., Devipriya, V.S.: An improved approach for Enhancing Public Cloud Data Security through Steganographic
In , a steganographic
scheme is proposed using different edge detectors like Canny, Sobel, and Fuzzy.
Tsai, "A steganographic
method for images by pixel-value differencing," Pattern Recognition Letters, vol.
In the future, we should investigate another low bit-rate speech codec applicable to wireless communication and design new steganographic
High capacity steganographic
method based upon JPEG.
Kaspersky noted the scientific development and testing of a variety of steganographic
methods and algorithms.