A survey on Deep-Learning-based image steganography

B Song, P Wei, S Wu, Y Lin, W Zhou - Expert Systems with Applications, 2024 - Elsevier
With the development of Internet and multimedia development, digital image steganography
is becoming more extensive in transmitting data with high capacity and security. Although …

Secure high payload steganography: A model-based approach

T Rabie, M Baziyad, I Kamel - Journal of Information Security and …, 2021 - Elsevier
The strong energy compaction property of the Discrete Cosine Transform (DCT) has inspired
DCT-based steganography techniques to embed secret data in large areas of the …

Maximizing embedding capacity for speech steganography: a segment-growing approach

M Baziyad, I Shahin, T Rabie, AB Nassif - Multimedia Tools and …, 2021 - Springer
It has been proven that the higher the correlation level between samples in the time-domain
of a digital signal, the stronger the energy com paction property in the Discrete Cosine …

High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach.

T Rabie, M Baziyad, I Kamel - Algorithms, 2024 - search.ebscohost.com
Abstract The Discrete Cosine Transform (DCT) is fundamental to high-capacity data hiding
schemes due to its ability to condense signals into a few significant coefficients while leaving …

Polynomial fitting: enhancing the stego quality of DCT-based Steganography schemes

M Baziyad, T Rabie, I Kamel, M Benkhelifa - Multimedia Tools and …, 2022 - Springer
The strong energy compaction property of the Discrete Cosine Transform (DCT) has been
widely proposed as a solution to the capacity-quality trade-off problem in steganography …

PixoComp: a novel video compression scheme utilizing temporal pixograms

T Rabie, M Baziyad - Multimedia Tools and Applications, 2020 - Springer
This paper introduces a new compression scheme that exploits temporal redundancies in
video segments utilizing the pixogram concept recently introduced in the literature. By taking …

Nondeterministic secure LSB steganography for digital images

KF Rafat - 2020 International Conference on Cyber Warfare …, 2020 - ieeexplore.ieee.org
The practice of obscuring information on aneed to know'basis, but still sharing it with others,
is calledsecrecy.'The information that requires fortification is known as the secret. However …

Steganalysis of JPEG Images based on 2D-Gabor Filters and Feature Dimensionality Reduction

SM Hashim, HA Nahi… - 2022 3rd Information …, 2022 - ieeexplore.ieee.org
when steganography changes are limited to regions of complex texture, the JPEG
stenographic methods struggle to preserve image texture features in all orientations and …

[引用][C] Effects of discrete cosine transform arrangement patterns on full size image steganography♣