A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …

A novel image steganographic method based on integer wavelet transformation and particle swarm optimization

PK Muhuri, Z Ashraf, S Goel - Applied Soft Computing, 2020 - Elsevier
Image steganography is a technique of hiding secret data into a cover image and so as to
prevent the intruders from accessing the secret data. The efficiency of image steganography …

Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage

P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …

[PDF][PDF] Chaotic map based random image steganography using lsb technique.

S Rajendran, M Doraipandian - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
Steganography play an important role to transfer secret data over insecure network.
Moreover digital images are taken as a cover to communicate the sensitive data. One of the …

[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021 - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …

ROI-based medical image watermarking for accurate tamper detection, localisation and recovery

D Ravichandran, P Praveenkumar… - Medical & Biological …, 2021 - Springer
Smart healthcare systems play a vital role in the current era of Internet of Things (IoT) and
Cyber-Physical Systems (CPS); ie Industry 4.0. Medical data security has become the …

A new steganography method which preserves histogram: Generalization of LSB++

K Qazanfari, R Safabakhsh - Information Sciences, 2014 - Elsevier
Histogram-based steganalysis methods diagnose abnormalities in the stego histogram.
LSB+ and outguess are two steganography methods which preserve the cover histogram …