New advancements in cybersecurity: A comprehensive survey

MA Hassan, S Ali, M Imad, S Bibi - Big Data Analytics and Computational …, 2022 - Springer
World is now considered as global village because of interconnected networks. Smart
phones and large computing devices exchange millions of information each day. Information …

[HTML][HTML] Inverted LSB image steganography using adaptive pattern to improve imperceptibility

S Rustad, A Syukur, PN Andono - … of King Saud University-Computer and …, 2022 - Elsevier
Various image steganography methods have been developed to improve the stego image
quality, ie imperceptibility, capacity, and security. This research proposes an adaptive …

Very high capacity image steganography technique using quotient value differencing and LSB substitution

G Swain - Arabian Journal for Science and Engineering, 2019 - Springer
This article proposes a very high capacity steganography technique using differencing and
substitution mechanisms. It divides the image into non-overlapped 3 * 3 3× 3 pixel blocks …

A modified DWT-based image steganography technique

V Kumar, D Kumar - Multimedia Tools and Applications, 2018 - Springer
The main challenges of image steganography are imperceptibility of the cover image and no
recoverability of the secret data. To deal with these challenges, a modified digital image …

A new image steganography method with optimum pixel similarity for data hiding in medical images

S Karakus, E Avci - Medical hypotheses, 2020 - Elsevier
Steganography is one of the approaches used in data hiding. Image steganography, is a
type of steganography that the image is used as a covering object. Data hiding capacity and …

An image steganography method based on integer wavelet transform

A Miri, K Faez - Multimedia Tools and Applications, 2018 - Springer
This paper presents a novel approach for Image steganography based on Integer Wavelet
Transform. In this method, the cover image is mapped to a specific frequency domain. Then …

A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing

D Huo, Z Zhu, X Zhou, L Wei, X Bai, Y Bai, C Han - Heliyon, 2023 - cell.com
Background: Encrypting plain images into noise-like cipher images is a common method in
image encryption. However, when noise-like images appear in public networks, they are …

An adaptive fuzzy inference approach for color image steganography

L Tang, D Wu, H Wang, M Chen, J Xie - Soft Computing, 2021 - Springer
This paper proposes an adaptive fuzzy inference approach for color image steganography,
taking into account the influence of image complexity such as pixel similarity, pixel …

An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method

S Sajasi, AME Moghadam - Applied Soft Computing, 2015 - Elsevier
Steganography is the science of hiding secret message in an appropriate digital multimedia
in such a way that the existence of the embedded message should be invisible to anyone …

New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization

NN El-Emam - Computers & Security, 2015 - Elsevier
A new steganography algorithm based on five protection layers has been suggested in this
paper for embedding a large amount of secret messaging in a color image, as represented …