A survey of recent advances in image steganography

A Kumar, R Rani, S Singh - Security and Privacy, 2023 - Wiley Online Library
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

S Rahman, J Uddin, H Hussain, A Ahmed, AA Khan… - Scientific Reports, 2023 - nature.com
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …

Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map

A Al-Daraiseh, Y Sanjalawe, S Al-E'mari… - Journal of Sensor and …, 2023 - mdpi.com
In recent years, there has been an increasing interest in employing chaotic-based random
number generators for cryptographic purposes. However, many of these generators produce …

A novel and efficient digital image steganography technique using least significant bit substitution

S Rahman, J Uddin, H Hussain, S Shah, A Salam… - Scientific Reports, 2025 - nature.com
Steganography is used to hide sensitive types of data including images, audio, text, and
videos in an invisible way so that no one can detect it. Image-based steganography is a …

A new architecture based resnet for steganography in color images

SHO Hashemi, MH Majidi… - Multimedia Tools and …, 2024 - Springer
This paper proposes a deep-learning color image steganography scheme that employs
convolutional autoencoders with ResNet architecture. In the proposed method, all images …

A robust watermarking algorithm against JPEG compression based on multiscale autoencoder

W Zhang, R Chen, B Wang - IET Image Processing, 2024 - Wiley Online Library
The network structure of digital watermarking algorithm based on deep learning is usually
encoder‐noise layer‐decoder. Most of the existing encoders suffer from the problem of …

An effect image steganography system based on pixels disparity value and secret message compression

MS Mustafa - 2022 - openaccess.altinbas.edu.tr
The first priority in the technology and modern communication is improving an effective and
delicate steganography scheme when considering data hiding. Developing such a scheme …

Enhancing data security through an integrated approach of multiple key cryptography and steganography in the wavelet domain

AFAH Hashem, MA Medvedeva… - … Methods in Science and …, 2024 - taylorfrancis.com
The quantity of data that may be incorporated and the picture quality must be compromised
in order to embed data within an image. As a direct result of this increased distortion, the …