Detecting stegomalware: malicious image steganography and its intrusion in windows

V Verma, SK Muttoo, VB Singh - … and Data Analytics: Select Proceedings of …, 2022 - Springer
Steganography, a data hiding technique has trended into hiding the malware within digital
media, giving rise to stegomalware. Specifically, digital images pose a potential threat due to …

Cartesian coordinated adaptive hiding for payload peaking

V Manikandan, R Amirtharajan - Multimedia Tools and Applications, 2024 - Springer
Transferring multimedia content without detection has gained traction over time. Employing
steganography for hiding secret data, viz. passwords, medical information, and private …

A Novel Method of high-Capacity Steganography Technique in Double Precision Images

J Singh, M Singla - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Purpose of digital image steganography is to hide the existence of secret information into
digital images. The spatial domain digital image steganography is flourishing area from the …

[PDF][PDF] Security test using StegoExpose on hybrid deep learning model for reversible image steganography

A Oludele, I Sunday, K Afolashade… - … , Ilishan-Remo, Ogun …, 2022 - researchgate.net
Image steganography is an act of concealing secret information using the image as a cover
medium. It is said to be reversible when the same level of importance placed on the retrieval …

Recursive quad-tree block partitioning for data embedding in images

T Shanableh - SN Computer Science, 2020 - Springer
In this paper, we propose to embed messages in raw images using a recursive block
partitioning technique adopted from HEVC video coding technology. This work introduces a …

Residual Steganography: Embedding Secret Data in Images using Residual Networks

VPR Poluri, S Gunnam, B Maredi… - 2023 6th International …, 2023 - ieeexplore.ieee.org
All the residing image steganography methods depicts the problem of degradation, low
capacity. In order to overcome this problem, we introduce an encoder decoder based …

Data Hiding in the Division Domain: Simultaneously Achieving Robustness to Scaling and Additive Attacks

S Yu, J Qin, J Deng, S Lyu, F Li - International Conference of Pioneering …, 2022 - Springer
Data hiding plays an important role in privacy protection and authentication, but most data
hiding methods fail to achieve satisfactory performance in resisting scaling attacks and …

Steganography in Colour Images with Proposed Arnold Chaotic Map and Optimized Curvelet Transform

S Nipanikar, R Nipanikar, M Kulkarni - Information and Communication …, 2023 - Springer
Steganography seems to be the process of concealing secret information within a non-
secret file or communication to prevent discovery; this hidden information is then retrieved at …

An Empirical Study for Image Steganography and Steganalysis: A Challenging Overview

B Sargunam - 2023 - papers.ssrn.com
In recent years, computers and the internet are two most important means of communication.
The fear of having one's data spied on while it is being sent from one party to another has …

Image Watermarking Based on Discrete Wavelet Transform and Biogeography-Based Optimization

R Tiwari - 2022 2nd International Conference on Advance …, 2022 - ieeexplore.ieee.org
With the growth of information technology has led to a overabundance of multimedia
information flowing over network systems. As a result, security duties in connection to …