Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

[HTML][HTML] A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques

IQ Abduljaleel, ZA Abduljabbar, MA Al Sibahee… - Journal of Sensor and …, 2022 - mdpi.com
Data security can involve embedding hidden images, text, audio, or video files within other
media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …

Secret message protection using fuzzy logic and difference expansion in digital images

NJ De La Croix, CC Islamy… - 2022 IEEE Nigeria 4th …, 2022 - ieeexplore.ieee.org
Secrete message protection has become a focal point of the network security domain due to
the problems of violating the network use policies and unauthorized access of the public …

Reversible data hiding based on prediction-error value ordering and multiple-embedding

W Qi, T Zhang, X Li, B Ma, Z Guo - Signal Processing, 2023 - Elsevier
Prediction-error expansion (PEE) is the most widely investigated reversible data hiding
(RDH) framework. However, the performance of PEE can be further improved since the …

Medical image watermarking for telemedicine application security

K Amine, K Fares, KM Redouane… - Journal of Circuits …, 2022 - World Scientific
In this work, we proposed a robust and blind watermarking approach to adequately secure
medical images exchanged in telemedicine. This approach ensures the traceability and …

Dynamic smart random preference for higher medical image confidentiality

A Gutub - Journal of Engineering Research, 2023 - kuwaitjournals.org
It is essential to secure the information to store or transfer digital files without destruction.
Currently, all used e-data requests to be utilized in well-controlled, protected, and …

Neural networks-based data hiding in digital images: overview

K Dzhanashia, O Evsutin - Neurocomputing, 2024 - Elsevier
Nowadays, neural networks are actively used for data hiding; however, there is currently no
systematic knowledge regarding their utilization in this field. This is a significant gap …

A non-subsampled Shearlet transform based approach for heartbeat sound watermarking

MS Moad, MR Kafi, A Khaldi - Biomedical Signal Processing and Control, 2022 - Elsevier
To secure the heartbeat sound exchanged in telemedicine, we propose in this work a blind
watermarking approach combining a Non-Subsampled Shearlet Transform and Singular …

Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher

MZ Konyar, S Solak - Journal of Information Security and Applications, 2021 - Elsevier
In recent years, the importance of information security has increased due to the growth in
digital communication and steganography has come to the fore for secure communication …

Steganography based on quotient value differencing and pixel value correlation

R Sonar, G Swain - CAAI Transactions on Intelligence …, 2021 - Wiley Online Library
Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐
images. Most PVD‐based techniques have a fall‐off boundary problem (FOBP). To avoid …