Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

High invisibility image steganography with wavelet transform and generative adversarial network

Y Yao, J Wang, Q Chang, Y Ren, W Meng - Expert Systems with …, 2024 - Elsevier
Recently, extensive research is showing that deep learning has enormous potential in
image steganography. However, most steganography methods based on deep learning are …

A discrete cosine transform-based intelligent image steganography scheme using quantum substitution box

S Maurya, N Nandu, T Patel, VD Reddy… - Quantum Information …, 2023 - Springer
Everyday dealing with enormous amounts of sensitive data requires its protection and
communication over the insecure network. The field of 'Steganography'always attracted …

[HTML][HTML] Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA

PK Singh, B Jana, K Datta - Journal of King Saud University-Computer and …, 2022 - Elsevier
The emergence of data hiding schemes was to provide multimedia security besides the
sharing of information in a confidential manner. Since then, various techniques have …

A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique

V Kalaichelvi, P Meenakshi, P Vimala Devi… - Journal of Ambient …, 2021 - Springer
Nowadays, due to the rapid technological growth of information technology billions of data
transferred through the network around the world in a fraction of seconds. To protect the …

Novel way to research nonlinear feedback shift register

DW Zhao, HP Peng, LX Li, SL Hui, YX Yang - Science China Information …, 2014 - Springer
In this paper, we regard the nonlinear feedback shift register (NLFSR) as a special Boolean
network, and use semi-tensor product of matrices and matrix expression of logic to convert …

MI-LFGOA: multi-island levy-flight based grasshopper optimization for spatial image steganalysis

S Chhikara, R Kumar - Multimedia Tools and Applications, 2020 - Springer
A few rich models of steganalysis have been developed that produce high dimensional
feature sets for good detection accuracy with high computational cost and time. This paper …

Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach

WM Abduallah, AMS Rahma, ASK Pathan - Computers & Electrical …, 2014 - Elsevier
In this paper, we present a novel method for data hiding within transform domain of the color
images. Our method is based on dividing an image into blocks, then applying the proposed …

[PDF][PDF] A review on steganography techniques

WM Abduallah, AMS Rahma - American Scientific Research …, 2016 - researchgate.net
Steganography is the science of hiding a secret message in cover media, without any
perceptual distortion of the cover media. Using steganography, information can be hidden in …