A survey of recent advances in image steganography

A Kumar, R Rani, S Singh - Security and Privacy, 2023 - Wiley Online Library
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …

A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm

HR Kanan, B Nazeri - Expert systems with applications, 2014 - Elsevier
Steganography is knowledge and art of hiding secret data into information which is largely
used in information security systems. Various methods have been proposed in the literature …

An optimized steganography hiding capacity and imperceptibly using genetic algorithms

R Wazirali, W Alasmary, MMEA Mahmoud… - IEEE Access, 2019 - ieeexplore.ieee.org
In stenography, embedding data within an image has a trade-off between image quality and
embedding capacity. Specifically, the more data are concealed within a carrier image, the …

Applications of data hiding techniques in medical and healthcare systems: a survey

H Sajedi - Network Modeling Analysis in Health Informatics and …, 2018 - Springer
Nowadays, scientists make effort to provide security for the communication channels.
Several security and privacy threats are introduced via the Internet as the major …

A dynamic three-bit image steganography algorithm for medical and e-healthcare systems

GF Siddiqui, MZ Iqbal, K Saleem, Z Saeed… - IEEE …, 2020 - ieeexplore.ieee.org
Massive advances in internet infrastructure are impacting e-healthcare services compared to
conventional means. Therefore, extra care and protection is needed for extremely …

A compression-based text steganography method

E Satir, H Isik - Journal of Systems and Software, 2012 - Elsevier
In this study, capacity and security issues of text steganography have been considered to
improve by proposing a novel approach. For this purpose, a text steganography method that …

A steganography algorithm based on CycleGAN for covert communication in the Internet of Things

R Meng, Q Cui, Z Zhou, Z Fu, X Sun - IEEE Access, 2019 - ieeexplore.ieee.org
With the wide application of the Internet of Things (IoT), the risk of data leakage and theft in
IoT is gradually increasing since communication channel is public in data transmission …

New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization

NN El-Emam - Computers & Security, 2015 - Elsevier
A new steganography algorithm based on five protection layers has been suggested in this
paper for embedding a large amount of secret messaging in a color image, as represented …

A novel algorithm for colour image steganography using a new intelligent technique based on three phases

NN El-Emam, M Al-Diabat - Applied Soft Computing, 2015 - Elsevier
A three-phase intelligent technique has been constructed to improve the data-hiding
algorithm in colour images with imperceptibility. The first phase of the learning system (LS) …

Distributed data hiding in multi-cloud storage environment

L Moyou Metcheka, R Ndoundam - Journal of Cloud Computing, 2020 - Springer
Classical or traditional steganography aims at hiding a secret in cover media such as text,
image, audio, video or even in network protocols. Recent research has improved this …