Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

Image encryption based on a combination of multiple chaotic maps

MT Elkandoz, W Alexan - Multimedia Tools and Applications, 2022 - Springer
Recent years have seen a rapid evolution of digital communications and an immense use of
image transmissions over unsecured links. More specifically, some domains require the …

Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …

[HTML][HTML] Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage

P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …

[HTML][HTML] Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

[HTML][HTML] Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats

S Rahman, J Uddin, H Hussain, S Jan, I Khan… - Sustainability, 2023 - mdpi.com
The Internet and Big Data expansion have motivated the requirement for more generous
stockpiling to hold and share information. Against the current era of information …

[HTML][HTML] Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication

SS Tevaramani, J Ravi - Global Transitions Proceedings, 2022 - Elsevier
The opportunities to exchange information in the current web era have risen. The increased
popularity of the media has posed real challenges to security-related issues. Steganography …

A steganography embedding method based on CDF-DWT technique for data hiding application using Elgamal algorithm

KS Rekha, MJ Amali, M Swathy, M Raghini… - … Signal Processing and …, 2023 - Elsevier
Steganography is a data hiding method used for security purposes. While hiding more data
in the embedding process, the data may be lost and cause some security problems. The …

[HTML][HTML] Toward agent-based LSB image steganography system

FA Baothman, BS Edhah - Journal of Intelligent Systems, 2021 - degruyter.com
In a digital communication environment, information security is mandatory. Three essential
parameters used in the design process of a steganography algorithm are Payload, security …