several researchers due to its importance in various fields ranging from national security
(Tutun et al. in Procedia Comput Sci 114: 132–138, 2017 [73]) to social profile (Gupta and
Dhami in J Direct Data Digit Mark Pract 17: 43–53, 2015 [29]). Cryptography (Coron in IEEE
Secur Priv 4: 70–73, 2006 [17]) and Steganography (Cheddad and Condell in Sig Process
90: 727–752, 2010 [14], Rabah in Inf Technol J 3: 245–269, 2004 [59]) are the two major …