High-capacity steganography: a global-adaptive-region discrete cosine transform approach

T Rabie, I Kamel - Multimedia Tools and Applications, 2017 - Springer
An increasing number of spatial and frequency domain data hiding techniques have been
proposed to address the relatively low embedding capacities of image-based …

A high capacity double-layer gray code based security scheme for secure data embedding

G Mostafa, W Alexan - 2019 International Symposium on …, 2019 - ieeexplore.ieee.org
With the recent amelioration in digital communication and cloud storage, security remains a
concern. Even though cryptographic algorithms have been readily used, they have been …

Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid

T Rabie, M Baziyad, I Kamel - Multimedia Tools and Applications, 2018 - Springer
This paper introduces a high capacity image hiding scheme with enhanced stego image
quality. This new hiding scheme utilizes a multiscale Laplacian pyramid of the cover image …

[PDF][PDF] A review on steganography techniques

WM Abduallah, AMS Rahma - American Scientific Research …, 2016 - researchgate.net
Steganography is the science of hiding a secret message in cover media, without any
perceptual distortion of the cover media. Using steganography, information can be hidden in …

Efficient image steganography using graph signal processing

VK Sharma, DK Srivastava, P Mathur - IET Image Processing, 2018 - Wiley Online Library
Steganography is used for secret or covert communication. A graph wavelet transform‐
based steganography using graph signal processing (GSP) is presented, which results in …

Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach

T Rabie, I Kamel - Multimedia Tools and Applications, 2017 - Springer
Embedding capacities of steganographic information security systems have remained
relatively low due to the adverse effect on perceptibility, where researchers had to trade-off …

Probabilistic analysis of targeted attacks using transform-domain adversarial examples

Z Yahya, M Hassan, S Younis, M Shafique - IEEE Access, 2020 - ieeexplore.ieee.org
In the past decade, Deep Neural Networks (DNNs) have achieved breakthrough
collaborations in developing smart intelligent systems within the field of computer vision …

On the embedding limits of the discrete cosine transform

T Rabie, I Kamel - Multimedia Tools and Applications, 2016 - Springer
This paper investigates the embedding capacity limits of high-capacity data hiding in color
images based on a locally Adaptive-Region Discrete Cosine Transform (AR-DCT) frequency …

Extended exploiting modification direction based steganography using hashed-weightage array

S Saha, A Chakraborty, A Chatterjee… - Multimedia Tools and …, 2020 - Springer
Steganography is the method of hiding secret message information in various cover media
like text, image, audio, video and others without raising suspicion to intruders about the …

Two-point FFT-based high capacity image steganography using calendar based message encoding

N Mukherjee, G Paul, SK Saha - Information Sciences, 2021 - Elsevier
In this work, we show how to hide a maximum of 8 bits of secret data into the pixel difference
value. Adjacent pixel pairs are chosen in a non-sequential manner in the spatial domain …