Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review

R Apau, M Asante, F Twum, J Ben Hayfron-Acquah… - Plos one, 2024 - journals.plos.org
Information hiding in images has gained popularity. As image steganography gains
relevance, techniques for detecting hidden messages have emerged. Statistical …

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

S Rahman, J Uddin, H Hussain, A Ahmed, AA Khan… - Scientific Reports, 2023 - nature.com
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …

Development of secrete images in image transferring system

HK Bhuyan, A Vijayaraj, V Ravi - Multimedia Tools and Applications, 2023 - Springer
This paper addresses a model to secrete the information of one image under another
without losing quality of image. Different approaches have been utilized for image hiding as …

[PDF][PDF] A Review of Image Steganography Based on Multiple Hashing Algorithm.

A Alenizi, MS Mohammadi, AA Al-Hajji… - … , Materials & Continua, 2024 - researchgate.net
Steganography is a technique for hiding secret messages while sending and receiving
communications through a cover item. From ancient times to the present, the security of …

An adaptive steganography insertion technique based on wavelet transform

T Alobaidi, W Mikhael - Journal of Engineering and Applied Science, 2023 - Springer
Over the past few decades, there have been several successful methods developed for
steganography. One popular technique is the insertion method, which is favored for its …

Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video

M Siregar, A Jinan, TMR Gunung - Journal of Computer …, 2024 - jurnal.itscience.org
In communication, there is a process of transferring information from the sender to the
recipient. The information sent must be the same as the information received. If there are …

Lightweight Models for Real-Time Steganalysis: A Comparison of MobileNet, ShuffleNet, and EfficientNet

A Bauravindah, DH Fudholi - Jurnal RESTI (Rekayasa Sistem dan …, 2024 - jurnal.iaii.or.id
In the digital age, the security of communication technologies is paramount, with cybercrime
projected to reach $10.5 trillion annually by 2025. While encryption is vital, decrypted data …

TRACK-S-IT: Multiobject Tracking-based Steganography for Securing IoMT Data

S Magdy, S Youssef… - Journal of Advanced …, 2024 - semarakilmu.com.my
Abstract Internet of Medical Things (IoMT) facilitates medical services including real-time
diagnosis, remote patient monitoring, and real-time medicine prescriptions. IoMT …

An effect image steganography system based on pixels disparity value and secret message compression

MS Mustafa - 2022 - openaccess.altinbas.edu.tr
The first priority in the technology and modern communication is improving an effective and
delicate steganography scheme when considering data hiding. Developing such a scheme …

Enhancing Communication Security with a Telegram Bot for Encrypted Image Communication Using F5-LSB Steganography

PB Kumbharkar, B Gope, T Chavan… - … on Expert Clouds …, 2024 - ieeexplore.ieee.org
In response to the increasing need for secure online communication and growing data
privacy concerns, this study introduces a technically robust Telegram bot for image …