Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

[HTML][HTML] Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

A new method of coding for steganography based on LSB matching revisited

M Fateh, M Rezvani, Y Irani - Security and communication …, 2021 - Wiley Online Library
LSB matching revisited is an LSB‐based approach for image steganography. This method is
a type of coding to increase the capacity of steganography. In this method, two bits of the …

[HTML][HTML] Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover

A Durafe, V Patidar - Journal of King Saud University-Computer and …, 2022 - Elsevier
The assurance of secret data transmitted over the Internet and confining its access to explicit
grouped information has become a significant security and protection issue. To hide the …

A high-capacity and reversible patient data hiding scheme for telemedicine

H Zhang, S Sun, F Meng - Biomedical Signal Processing and Control, 2022 - Elsevier
The quality and efficiency of telemedicine make progress successfully due to the launch of
Electronic Medical Record (EMR). However, EMR suffers information security problems such …

[HTML][HTML] An Artificial Neural Network-Based Approach for Real-Time Hybrid Wind–Solar Resource Assessment and Power Estimation

I Shafi, H Khan, MS Farooq, IT Diez, Y Miró, JC Galán… - Energies, 2023 - mdpi.com
The precise prediction of power estimates of wind–solar renewable energy sources
becomes challenging due to their intermittent nature and difference in intensity between day …

[HTML][HTML] A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters' Diacritics and Image Layers

SS Alqahtany, AB Alkhodre, A Al Abdulwahid… - Applied Sciences, 2023 - mdpi.com
Steganography is a widely used technique for concealing confidential data within images,
videos, and audio. However, using text for steganography has not been sufficiently explored …

Reversibility improved data hiding in 3D mesh models using prediction-error expansion and sorting

Q Zhang, X Song, T Wen, C Fu - Measurement, 2019 - Elsevier
Reversible data hiding (RDH) recover the original media without any distortion after
extraction of the hidden data. Since massive three-dimensional (3D) mesh models have …