Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

Local binary pattern‐based reversible data hiding

M Sahu, N Padhy, SS Gantayat… - CAAI Transactions on …, 2022 - Wiley Online Library
A novel local binary pattern‐based reversible data hiding (LBP‐RDH) technique has been
suggested to maintain a fair symmetry between the perceptual transparency and hiding …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

Cover selection for steganography using image similarity

Z Wang, G Feng, L Shen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Existing cover selection methods for steganography mainly focus on embedding distortion of
each image, but ignore the similarity between images. When the cover images are similar, a …

A novel hybrid edge detection and LBP Code-Based Robust Image Steganography method

H Sultana, AHM Kamal, G Hossain, MA Kabir - Future Internet, 2023 - mdpi.com
In digital image processing and steganography, images are often described using edges
and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid …

[HTML][HTML] Stego-chain: A framework to mine encoded stego-block in a decentralized network

P Sarkar, SK Ghosal, M Sarkar - Journal of King Saud University-Computer …, 2022 - Elsevier
Traditional image steganography conceals secret data into the cover image and then
transmits the resulting stego-image to the intended recipient via an insecure channel. The …

Secure visual communication with advanced cryptographic and ımage processing techniques

V Sathananthavathi, K Ganesh Kumar… - Multimedia Tools and …, 2024 - Springer
Securing data during transmission is critical to prevent unauthorized access, interception, or
modification of the data. Data can be communicated securely while maintaining its …

Diverse Batch Steganography using Model-based Selection and Double-layered Payload Assignment

J Yu, F Li, Z Wang, W Si, X Zhang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Batch steganography regarding to image-selection and payload-allocation has gained
increasing attention due to the secure demanding of data hiding of real scenario. However …

DISH: Digital image steganography using stochastic-computing with high-capacity

M EL-Hady, MH Abbas, FA Khanday, LA Said… - Multimedia Tools and …, 2024 - Springer
Stochastic computing is a relatively new approach to computing that has gained interest in
recent years due to its potential for low-power and high-noise environments. It is a method of …

Pooled Steganalysis via Model Discrepancy

J Yu, J Zhang, F Li - Mathematics, 2024 - mdpi.com
Pooled steganalysis aims to discover the guilty actor (s) among multiple normal actor (s).
Existing techniques mainly rely on the high-dimension and time-consuming features …