Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

PSNR vs SSIM: imperceptibility quality assessment for image steganography

DRIM Setiadi - Multimedia Tools and Applications, 2021 - Springer
Peak signal to noise ratio (PSNR) and structural index similarity (SSIM) are two measuring
tools that are widely used in image quality assessment. Especially in the steganography …

Hiding data using efficient combination of RSA cryptography, and compression steganography techniques

OFA Wahab, AAM Khalaf, AI Hussein… - IEEE access, 2021 - ieeexplore.ieee.org
Data compression is an important part of information security because compressed data is
more secure and easy to handle. Effective data compression technology creates efficient …

Neural style transfer for image within images and conditional GANs for destylization

JS Ubhi, AK Aggarwal - Journal of Visual Communication and Image …, 2022 - Elsevier
In this paper, the feature representation of an image by CNN is used to hide the secret
image into the cover image. The style of the cover image hides the content of the secret …

[HTML][HTML] Inverted LSB image steganography using adaptive pattern to improve imperceptibility

S Rustad, A Syukur, PN Andono - … of King Saud University-Computer and …, 2022 - Elsevier
Various image steganography methods have been developed to improve the stego image
quality, ie imperceptibility, capacity, and security. This research proposes an adaptive …

Improved payload capacity in LSB image steganography uses dilated hybrid edge detection

DRIM Setiadi - 2022 - dl.acm.org
This research proposed the dilated hybrid edge detection on the three most significant bits
(MSB) pixels of cover images with the aim of expanding the edge area so as to increase the …

Neural style transfer for image steganography and destylization with supervised image to image translation

M Garg, JS Ubhi, AK Aggarwal - Multimedia Tools and Applications, 2023 - Springer
Today, a lot of information is being shared electronically in a way or another. Despite the
advancements in technology used for data transfer, the reliable transmission of sensitive …

An improved security and message capacity using AES and Huffman coding on image steganography

CA Sari, G Ardiansyah… - … Electronics and Control …, 2019 - telkomnika.uad.ac.id
Abstract Information security is very important and has been widely implemented.
Cryptography and steganography are two common methods that can be implemented to …

Quantization selection based on characteristic of cover image for PVD Steganography to optimize imperceptibility and capacity

PN Andono, DRIM Setiadi - Multimedia Tools and Applications, 2023 - Springer
Abstract Pixel Value Differencing (PVD) is one of the popular steganography methods and
continues to be developed today. This method works based on differences in pixel …

Extended exploiting modification direction based steganography using hashed-weightage array

S Saha, A Chakraborty, A Chatterjee… - Multimedia Tools and …, 2020 - Springer
Steganography is the method of hiding secret message information in various cover media
like text, image, audio, video and others without raising suspicion to intruders about the …