A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Video steganography: A review

Y Liu, S Liu, Y Wang, H Zhao, S Liu - Neurocomputing, 2019 - Elsevier
Video steganography is becoming an important research area in various data hiding
technologies, which has become a promising tool because not only the security requirement …

Chaotic local search-based differential evolution algorithms for optimization

S Gao, Y Yu, Y Wang, J Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
JADE is a differential evolution (DE) algorithm and has been shown to be very competitive in
comparison with other evolutionary optimization algorithms. However, it suffers from the …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

Optimized multimedia data through computationally intelligent algorithms

N Sharma, C Chakraborty, R Kumar - Multimedia Systems, 2023 - Springer
In the field of data exchange, the security of information is the critical aspect. This void in the
security helped the evolution of steganography to address the problem of security …

Secure video communication using firefly optimization and visual cryptography

M Kumar, J Aggarwal, A Rani, T Stephan… - Artificial Intelligence …, 2022 - Springer
In recent years, we face an increasing interest in protecting multimedia data and copyrights
due to the high exchange of information. Attackers are trying to get confidential information …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

A novel perturbation method to reduce the dynamical degradation of digital chaotic maps

L Liu, H Xiang, X Li - Nonlinear Dynamics, 2021 - Springer
A chaotic map, which is realized on finite precision device, such as computer, will suffer
dynamical degradation. Such chaotic maps cannot be regarded as rigorous chaos anymore …

A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

A chaotic optimization method based on logistic-sine map for numerical function optimization

FB Demir, T Tuncer, AF Kocamaz - Neural Computing and Applications, 2020 - Springer
Meta-heuristic optimization algorithms have been used to solve mathematically
unidentifiable problems. The main purpose of the optimization methods on problem-solving …