Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

R Chaganti, V Ravi, M Alazab, TD Pham - arXiv preprint arXiv:2110.02504, 2021 - arxiv.org
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or from the internet, when the victim interacts with the source of infection. To …

[PDF][PDF] A review on recent steganography techniques in cloud computing

OM Ahmed, WM Abduallah - Academic Journal of Nawroz …, 2017 - researchgate.net
As with the growth of information on the cloud, cloud security is seen as more essential than
before. Presently, millions of users are utilizing the cloud. The security of cloud computing is …

[PDF][PDF] A secured image steganography using genetic algorithm

S Pramanik, SS Raja - Advances in Mathematics …, 2020 - research-publication.com
According to the optimization techniques examined in the past, the performance of Genetic
Algorithm (GA) based approaches are seen as a substandard technique compared to PSO …

[PDF][PDF] Secure data transfer over internet using image steganography

DM Abdullah, SY Ameen, N Omar… - Asian Journal of …, 2021 - researchgate.net
Whether it's for work or personal well-being, keeping secrets or private information has
become part of our everyday existence. Therefore, several researchers acquire an entire …

Blind image steganography algorithm development which resistant against JPEG compression attack

D Mehta, D Bhatti - Multimedia Tools and Applications, 2022 - Springer
Digital image steganography is now one of the effective methods for exchanging confidential
information over the public network. One of the major challenges is to protect secret data …

[PDF][PDF] Comparative analysis of different steganography technique for image or data security

M Kumar, S Kumar, H Nagar - International Journal of Advanced …, 2020 - researchgate.net
Today, the world is going to be digitized anyway. Each business unit, each government and
private sector, each research unit uses the digital image as a transfer mode for all critical …

Design and Comparative Analysis of a User-Friendly Telegram Bot for Image Steganography using F5 and LSB Algorithms

B Gope, S Nawale, S Deo, T Chavan… - 2023 8th …, 2023 - ieeexplore.ieee.org
Secure communication has become increasingly important with the rise of online
communication and data privacy concerns. Image steganography is a popular method for …

Image Steganography Based on Pixel Topology and Threshold on Selected Pixels Differences

ALD Qusai, TA AL-Assadi - 2023 6th International Conference …, 2023 - ieeexplore.ieee.org
In this paper, the author has suggested a steganography technique that exploits pixels
topology with a pre-determined embedding threshold that uses RGB (Red, Green, Blue) …

Stegomalware: A Systematic Survey of Malware Hiding and Detection in Images, Machine Learning Models and Research Challenges

M Alazab, T Pham - Authorea Preprints, 2023 - techrxiv.org
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or downloading illegitimate files from the internet, when the victim interacts …

An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)

KD Michelle, OG Gilibrays… - Journal of Independent …, 2024 - jisrc.szabist.edu.pk
Text teganography is a method used to hide confidential messages in a message's text
without arousing suspicion. This technique has been used in the past, from ancient Greece's …