Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

A novel image steganography method for industrial internet of things security

M Hassaballah, MA Hameed, AI Awad… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI)
brings new security threats by exposing secret and private data. Thus, information security …

[HTML][HTML] Federated learning optimization: A computational blockchain process with offloading analysis to enhance security

S Shitharth, H Manoharan, A Shankar… - Egyptian informatics …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technology in various applications used in data
processing systems requires high security because more data must be saved in cloud …

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …

Local binary pattern‐based reversible data hiding

M Sahu, N Padhy, SS Gantayat… - CAAI Transactions on …, 2022 - Wiley Online Library
A novel local binary pattern‐based reversible data hiding (LBP‐RDH) technique has been
suggested to maintain a fair symmetry between the perceptual transparency and hiding …

Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding

W Lu, J Zhang, X Zhao, W Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Social networks are everywhere and currently transmitting very large messages. As a result,
transmitting secret messages in such an environment is worth researching. However, the …

Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP

AK Sahu, G Swain, M Sahu, J Hemalatha - Journal of Information Security …, 2021 - Elsevier
Since the inception of pixel value differencing (PVD) image steganography, it has drawn
considerable interest among the researchers of this field. However, most of the PVD based …

Investigating the efficiency of deep learning based security system in a real-time environment using YOLOv5

F Majeed, FZ Khan, M Nazir, Z Iqbal, M Alhaisoni… - Sustainable Energy …, 2022 - Elsevier
Abstract Surveillance Systems Application based on deep learning algorithms is speedily
growing in a broad range of fields such as Facial Recognition, Real Time Attendance …

ENGA: elastic net-based genetic algorithm for human action recognition

IM Nasir, M Raza, SM Ulyah, JH Shah… - Expert Systems with …, 2023 - Elsevier
Video surveillance and activity monitoring are the practical real-time applications of Human
Action Recognition (HAR). A fusion of several Convolutional Neural Network (CNN) …