The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …

Blockchain-based secure and efficient secret image sharing with outsourcing computation in wireless networks

Z Zhou, Y Wan, Q Cui, K Yu, S Mumtaz… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Secret Image Sharing (SIS) is the technology that shares any given secret image by
generating and distributing shadow images in the way that any subset of shadow images …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm

HR Kanan, B Nazeri - Expert systems with applications, 2014 - Elsevier
Steganography is knowledge and art of hiding secret data into information which is largely
used in information security systems. Various methods have been proposed in the literature …

Utilization of secret sharing technology for secure communication: a state-of-the-art review

P Sarosh, SA Parah, GM Bhat - Multimedia Tools and Applications, 2021 - Springer
Cryptography is the process by which a readable message is converted into cipher-text
unintelligible to an eavesdropper. With the advent of the internet, improved network …

Sharing secrets in stego images with authentication

CC Chang, YP Hsieh, CH Lin - Pattern Recognition, 2008 - Elsevier
Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with
steganography and authentication, which divide a secret image into the shadows and …

[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021 - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …

Secret image sharing scheme with lossless recovery and high efficiency

S Luo, Y Liu, X Yan, Y Yu - Signal Processing, 2023 - Elsevier
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow
images of reduced size, which is beneficial for storage, transmission, and processing …

Invertible secret image sharing with steganography

PY Lin, CS Chan - Pattern Recognition Letters, 2010 - Elsevier
The essence of invertible image sharing approaches is that the revealed content of the
secret image must be lossless and the distorted stego images must be able to be reverted to …