Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

Local binary pattern‐based reversible data hiding

M Sahu, N Padhy, SS Gantayat… - CAAI Transactions on …, 2022 - Wiley Online Library
A novel local binary pattern‐based reversible data hiding (LBP‐RDH) technique has been
suggested to maintain a fair symmetry between the perceptual transparency and hiding …

Image steganography based on Canny edge detection, dilation operator and hybrid coding

K Gaurav, U Ghanekar - Journal of Information Security and Applications, 2018 - Elsevier
In this paper, a novel steganography algorithm based on local reference edge detection
technique and exclusive disjunction (XOR) property is proposed. Human eyes are less …

Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

[PDF][PDF] A review on security techniques in image steganography

S Ghoul, R Sulaiman, Z Shukur - International Journal of …, 2023 - researchgate.net
Given the increased popularity of the internet, the exchange of sensitive information leads to
concerns about privacy and security. Techniques such as steganography and cryptography …

High embedding capacity data hiding technique based on EMSD and LSB substitution algorithms

S Solak - IEEE Access, 2020 - ieeexplore.ieee.org
Data hiding called steganography is a security technique to protect secret data throughout
the transmission from malicious attackers. The purposes of steganography are to obtain …

[PDF][PDF] A robust data hiding reversible technique for improving the security in e-health care system

S Kanwal, F Tao, A Almogren… - … in Engineering & …, 2022 - researchgate.net
The authenticity and integrity of healthcare is the primary objective. Numerous reversible
watermarking schemes have been developed to improve the primary objective but …

[PDF][PDF] An improved data hiding technique using bit differencing and LSB matching

AK Sahu, G Swain - Internetworking Indonesia Journal, 2018 - researchgate.net
This paper proposes an improved image steganographic technique based on the principle
of modified least significant bit (LSB) substitution and LSB matching, to improve the capacity …

Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis

AK Sahu, G Swain - International Journal of Electronic …, 2019 - inderscienceonline.com
This paper proposes an improved data hiding technique using the principle of least
significant bit (LSB) substitution and pixel value differencing (PVD). It addresses two issues …