The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

[PDF][PDF] Data hiding: current status and key issues.

NI Wu, MS Hwang - Int. J. Netw. Secur., 2007 - isrc.asia.edu.tw
Image steganography is a covert communication method that uses an image as the cover to
hide the truth from potential attackers that some secret message hidden in the image is …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …

A high quality steganographic method with pixel-value differencing and modulus function

CM Wang, NI Wu, CS Tsai, MS Hwang - Journal of Systems and Software, 2008 - Elsevier
In this paper, we shall propose a new image steganographic technique capable of
producing a secret-embedded image that is totally indistinguishable from the original image …

A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

K Muhammad, M Sajjad, I Mehmood, S Rho… - Multimedia Tools and …, 2016 - Springer
Image Steganography is a thriving research area of information security where secret data is
embedded in images to hide its existence while getting the minimum possible statistical …

Thresholds based image extraction schemes in big data environment in intelligent traffic management

Y Liu, C Yang, Q Sun - IEEE transactions on intelligent …, 2020 - ieeexplore.ieee.org
Video traffic monitoring is an inexpensive and convenient source of traffic data. Traffic
images processing are widely used to check traffic conditions and they can determine traffic …

Blockchain-based secure and efficient secret image sharing with outsourcing computation in wireless networks

Z Zhou, Y Wan, Q Cui, K Yu, S Mumtaz… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Secret Image Sharing (SIS) is the technology that shares any given secret image by
generating and distributing shadow images in the way that any subset of shadow images …

A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm

HR Kanan, B Nazeri - Expert systems with applications, 2014 - Elsevier
Steganography is knowledge and art of hiding secret data into information which is largely
used in information security systems. Various methods have been proposed in the literature …

Improvements of image sharing with steganography and authentication

CN Yang, TS Chen, KH Yu, CC Wang - Journal of Systems and software, 2007 - Elsevier
Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and
authentication to prevent participants from the incidental or intentional provision of a false …

Sharing secrets in stego images with authentication

CC Chang, YP Hsieh, CH Lin - Pattern Recognition, 2008 - Elsevier
Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with
steganography and authentication, which divide a secret image into the shadows and …