Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …
life whether it is for our employment or personal well-being. Therefore, secure storage and …
A systematic review of computational image steganography approaches
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …
public channels. Therefore, significant interest has been given to providing secure …
A novel image steganography technique based on quantum substitution boxes
AA Abd EL-Latif, B Abd-El-Atty… - Optics & Laser …, 2019 - Elsevier
Substitution boxes play an essential role in designing secure cryptosystems. With the
evolution of quantum technologies, current data security mechanisms may be broken due to …
evolution of quantum technologies, current data security mechanisms may be broken due to …
Steganography and Steganalysis (in digital forensics): a Cybersecurity guide
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …
systems and digital forensics, respectively, but one that has matured greatly over the past …
Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage
P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …
proposes a double-matrix decomposition image steganography scheme with multi-region …
Double layer security using crypto-stego techniques: a comprehensive review
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …
multimedia objects for data communication. However, interchanging information through the …
High payload image steganography scheme with minimum distortion based on distinction grade value method
MS Taha, MSM Rahem, MM Hashim… - Multimedia Tools and …, 2022 - Springer
Presently, the design and development of an effective image steganography system are
facing several challenges including the low capacity, poor robustness and imperceptibility …
facing several challenges including the low capacity, poor robustness and imperceptibility …
A novel design of multiple image encryption using perturbed chaotic map
TM Hoang - Multimedia Tools and Applications, 2022 - Springer
For recent decades, the increasing volume of multimedia data has been witnessed, and the
data is required technical methods to assure the security for storage and transmission …
data is required technical methods to assure the security for storage and transmission …
Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography
S Pramanik, RP Singh, R Ghosh - Multimedia Tools and Applications, 2020 - Springer
The Internet is used for exchanging information. Sometimes it is required to transmit
confidential data over the internet. Here the authors use image steganography to embed …
confidential data over the internet. Here the authors use image steganography to embed …
A secured image steganography method based on ballot transform and genetic algorithm
Rapid advances in digital technology have facilitated us to transfer a huge amount of
electronic files over the internet. But in the presence of malicious attackers, the security, as …
electronic files over the internet. But in the presence of malicious attackers, the security, as …