Digital steganography and watermarking for digital images: A review of current research directions

O Evsutin, A Melman, R Meshcheryakov - IEEE Access, 2020 - ieeexplore.ieee.org
The development of information technology has led to a significant increase in the share of
multimedia traffic in data networks. This has necessitated to solve the following information …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

A secure image protection algorithm by steganography and encryption using the 2D-TSCC

Q Li, X Wang, H Wang, X Ye, S Zhou, S Gao… - Chinese Physics …, 2021 - iopscience.iop.org
Based on the two-dimensional (2D) tan-sin-cos-coupling (2D-TSCC), a new image
protection method is designed, this method includes steganography and encryption. First, a …

Hiding data in dual images based on turtle shell matrix with high embedding capacity and reversibility

XZ Xie, CC Chang - Multimedia Tools and Applications, 2021 - Springer
Reversible data hiding (RDH) is a technology that embeds secret data into a carrier where
both the secret data and the carrier can be recovered without any data loss. Inspired by dual …

Multi-hider reversible data hiding using a weighted color transfer and modulus operation

KS Hsieh, CM Wang - Applied Sciences, 2023 - mdpi.com
This paper proposes a multi-hider dual-image reversible data-hiding algorithm. Generating
dual stego images, the proposed algorithm provides a high embedding capacity, exhibits …

Exploring homogeneity index modification on dual-HDR-image-based reversible data hiding

YH Huang, PL Kuo, CS Peng, YY Tsai - Multimedia Tools and Applications, 2024 - Springer
Dual-image-based reversible data hiding refers to generating two output images after a
secret message has been embedded in an original image according to specific embedding …

Covert and Secure Communication Using Multiple Invisible Stego Images by Split-Logical Algorithm

LN Srinivasu, V Veeramani - IETE Journal of Research, 2023 - Taylor & Francis
The use of the web is developing for surreptitious and non-surreptitious communication with
the expansion of brilliant innovations. In this circumstance, there is a need to improve the …

[PDF][PDF] A systematic review: security information for agent approaches in networks-models and methods

EHJ Halboosa, AM Albakrya - Przegląd Elektrotechniczny, 2023 - pe.org.pl
The proliferation of dangers to transmitting vital information across a communication channel
has resulted from the advancement of communication systems. One of the security …