Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

PSNR vs SSIM: imperceptibility quality assessment for image steganography

DRIM Setiadi - Multimedia Tools and Applications, 2021 - Springer
Peak signal to noise ratio (PSNR) and structural index similarity (SSIM) are two measuring
tools that are widely used in image quality assessment. Especially in the steganography …

[HTML][HTML] Inverted LSB image steganography using adaptive pattern to improve imperceptibility

S Rustad, A Syukur, PN Andono - … of King Saud University-Computer and …, 2022 - Elsevier
Various image steganography methods have been developed to improve the stego image
quality, ie imperceptibility, capacity, and security. This research proposes an adaptive …

A survey on Deep-Learning-based image steganography

B Song, P Wei, S Wu, Y Lin, W Zhou - Expert Systems with Applications, 2024 - Elsevier
With the development of Internet and multimedia development, digital image steganography
is becoming more extensive in transmitting data with high capacity and security. Although …

[HTML][HTML] Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic

M Jana, B Jana, S Joardar - Journal of King Saud University-Computer and …, 2022 - Elsevier
The aim of designing self-embedding fragile watermarking is copy-right protection, tamper
localization and image recovery. This paper proposes a self-embedding fragile …

Image steganography based on difference of Gaussians edge detection

B Patwari, U Nandi, SK Ghosal - Multimedia Tools and Applications, 2023 - Springer
This paper introduces an edge-based image Steganography scheme in which the pixels of
the cover images are categorized into two classes: edge and non-edge. In general, the edge …

Hiding messages in audio using modulus operation and simple partition

IB Prayogi, T Ahmad, NJ de La Croix… - … on Information & …, 2021 - ieeexplore.ieee.org
Today's information technology tools allow people to share personal data and information
through online media. Data security techniques are also developed to protect confidential …

Image steganography based on Kirsch edge detection

SK Ghosal, A Chatterjee, R Sarkar - Multimedia Systems, 2021 - Springer
Conventional steganography methods fabricate the secret information into the cover pixels
without analyzing the pixel intensities of an image. As a result, some minor pixel level …

A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

A novel hybrid edge detection and LBP Code-Based Robust Image Steganography method

H Sultana, AHM Kamal, G Hossain, MA Kabir - Future Internet, 2023 - mdpi.com
In digital image processing and steganography, images are often described using edges
and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid …