Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT

S Dhawan, C Chakraborty, J Frnda, R Gupta… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a domain where the transfer of big data is taking place every single
second. The security of these data is a challenging task; however, security challenges can …

Image data hiding schemes based on metaheuristic optimization: a review

A Melman, O Evsutin - Artificial Intelligence Review, 2023 - Springer
The digital content exchange on the Internet is associated with information security risks.
Hiding data in digital images is a promising direction in data protection and is an alternative …

[HTML][HTML] A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks

B Abd-El-Atty - Neural Computing and Applications, 2023 - Springer
Medical information plays an essential task in our everyday lives, in which medical data
privacy and security constitute an important issue. The confidentiality of medical data can be …

A novel multi-perspective benchmarking framework for selecting image dehazing intelligent algorithms based on BWM and group VIKOR techniques

KH Abdulkareem, N Arbaiy, AA Zaidan… - … Journal of Information …, 2020 - World Scientific
The increasing demand for image dehazing-based applications has raised the value of
efficient evaluation and benchmarking for image dehazing algorithms. Several perspectives …

[HTML][HTML] PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence …

AH Mohsin, AA Zaidan, BB Zaidan… - Multimedia tools and …, 2021 - Springer
Secure updating and sharing for large amounts of healthcare information (such as medical
data on coronavirus disease 2019 [COVID-19]) in efficient and secure transmission are …

A logistic map based blind and fragile watermarking for tamper detection and localization in images

AK Sahu - Journal of Ambient Intelligence and Humanized …, 2022 - Springer
In real-time data transmission, the protection of multimedia content from unauthorized
access is pivotal. In this context, digital watermarking techniques have drawn significant …

Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain

A Melman, O Evsutin - Applied Soft Computing, 2023 - Elsevier
Image steganography and watermarking have demonstrated their efficiency in creating a
covert communication channel and in digital image authentication respectively. The …

[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021 - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …

Secure information embedding in images with hybrid firefly algorithm

S Nokhwal, M Chandrasekharan… - arXiv preprint arXiv …, 2023 - arxiv.org
Various methods have been proposed to secure access to sensitive information over time,
such as the many cryptographic methods in use to facilitate secure communications on the …