Image steganography approaches and their detection strategies: a survey

MH Kombrink, ZJMH Geradts, M Worring - ACM Computing Surveys, 2024 - dl.acm.org
Steganography is the art and science of hidden (or covered) communication. In digital
steganography, the bits of images, videos, audio and text files are tweaked to represent the …

[HTML][HTML] An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers

M Es-sabry, N El Akkad, L Khrissi, K Satori… - Egyptian Informatics …, 2024 - Elsevier
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging
the potential of four 1D chaotic maps–the Logistic map, Tent map, Chebyshev map, and …

Integrating machine learning and features extraction for practical reliable color images steganalysis classification

A Aljarf, H Zamzami, A Gutub - Soft Computing, 2023 - Springer
Steganalysis is a known practice to detect hidden secrecy within covered e-media.
Researches claimed obscured detection attainability via features extraction, as for …

Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review

R Apau, M Asante, F Twum, J Ben Hayfron-Acquah… - PloS one, 2024 - journals.plos.org
Information hiding in images has gained popularity. As image steganography gains
relevance, techniques for detecting hidden messages have emerged. Statistical …

A Novel and secure fake-modulus based Rabin-ӡ cryptosystem

RK Ramesh, R Dodmane, S Shetty, G Aithal, M Sahu… - Cryptography, 2023 - mdpi.com
Electronic commerce (E-commerce) transactions require secure communication to protect
sensitive information such as credit card numbers, personal identification, and financial data …

[HTML][HTML] Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability

A Gutub - Journal of Engineering Research, 2024 - Elsevier
Counting-based secret-sharing (CBSS) is a current cybersecurity technique that provide
applicable authentication for multi-participants collaborative trust access control utilization …

[HTML][HTML] FuzConvSteganalysis: Steganalysis via fuzzy logic and convolutional neural network

NJ De La Croix, T Ahmad - SoftwareX, 2024 - Elsevier
Emerging technologies based on the advancements in Deep Learning (DL) induced several
alternative approaches to address intricate problems, such as analyzing images in the …

Improving the robustness of steganalysis in the adversarial environment with Generative Adversarial Network

Y Peng, Q Yu, G Fu, WW Zhang, CF Duan - Journal of Information Security …, 2024 - Elsevier
As technology advances, the steganalysis methods based on Convolutional Neural Network
(CNN) can more precisely detect steganography behavior. However, the existing CNN …

Improved multiview biometric object detection for anti spoofing frauds

P Asmitha, C Rupa, S Nikitha, J Hemalatha… - Multimedia Tools and …, 2024 - Springer
Computer vision and deep learning are essential in human authentication. It provides
answers to numerous issues faced in the real world. Moreover, it has a great potential in …

[HTML][HTML] A novel image compression method using wavelet coefficients and Huffman coding

S Thomas, A Krishna, S Govind, AK Sahu - Journal of Engineering …, 2023 - Elsevier
Compressing medical images to reduce their size while maintaining their clinical and
diagnostic information is crucial. Because medical images can be large and demand a lot of …