Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context

R Kumar, KH Jung - Information Sciences, 2020 - Elsevier
Abstract Pixel-Value-Ordering (PVO) based reversible data hiding schemes provide high-
fidelity stego-images with moderate embedding capacity. In this paper, a novel reversible …

[HTML][HTML] Optimized interesting region identification for video steganography using Fractional Grey Wolf Optimization along with multi-objective cost function

M Suresh, IS Sam - Journal of King Saud University-Computer and …, 2022 - Elsevier
A novel approach is presented in this paper for hiding the data using Fractional Grey Wolf
Optimization. In this work, the key frames are extracted using the Structural Similarity Index …

An improved data hiding using pixel value difference method and hyperchaotic system

SA Fadhel, ZN Al-Kateeb… - Journal of Physics …, 2021 - iopscience.iop.org
The present paper builds a security system to encrypt and hide important text data. The
system utilized an AES method to conduct an encryption process, followed by hiding the …

Hiding data in dual color images reversibly via weighted matrix

P Chowdhuri, B Jana - Journal of Information Security and Applications, 2020 - Elsevier
Hiding information in dual images is a new aspect in the field of multimedia security to
increase security, enhance visual quality as well as improve embedding capacity. Few data …

A new sequential coding method for secure data communication

V Shukla, A Mishra - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
As everyone is aware that security of data communication is essential in modern scenario.
There is a continuous fight between cryptographers and cryptanalysists. Cryptographers …

A novel non-equilibrium hyperchaotic system and application on color image steganography with FPGA implementation

J Sun, H Cai, Z Gao, C Wang, H Zhang - Nonlinear Dynamics, 2023 - Springer
In this paper, a new hyperchaotic system without an equilibrium point is proposed and
analyzed. A novel steganography technique is advanced by combining the hyperchaotic …

Coverless Image Steganography Based on Jigsaw Puzzle Image Generation.

AHS Saad, MS Mohamed… - Computers, Materials & …, 2021 - search.ebscohost.com
Current image steganography methods are working by assigning an image as a cover ile
then embed the payload within it by modifying its pixels, creating the stego image. However …

Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data

AHM Almawgani, ARH Alhawari, AT Hindi… - … systems and signal …, 2022 - Springer
Digital images are commonly used in steganography due to the popularity of digital image
transfer and exchange through the Internet. However, the tradeoff between managing high …

A novel approach based on modified cycle generative adversarial networks for image steganography

PG Kuppusamy, KC Ramya, SS Rani… - … Computing: Practice and …, 2020 - scpe.org
Scalable Computing: Practice and Experience, ISSN 1895-1767, http://www.scpe.org © 2020
SCPE. Volume 21, Issue 1, pp. 63–72, Page 1 Scalable Computing: Practice and Experience …