Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

A novel image steganography technique based on quantum substitution boxes

AA Abd EL-Latif, B Abd-El-Atty… - Optics & Laser …, 2019 - Elsevier
Substitution boxes play an essential role in designing secure cryptosystems. With the
evolution of quantum technologies, current data security mechanisms may be broken due to …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage

P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …

Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

High payload image steganography scheme with minimum distortion based on distinction grade value method

MS Taha, MSM Rahem, MM Hashim… - Multimedia Tools and …, 2022 - Springer
Presently, the design and development of an effective image steganography system are
facing several challenges including the low capacity, poor robustness and imperceptibility …

A novel design of multiple image encryption using perturbed chaotic map

TM Hoang - Multimedia Tools and Applications, 2022 - Springer
For recent decades, the increasing volume of multimedia data has been witnessed, and the
data is required technical methods to assure the security for storage and transmission …

Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography

S Pramanik, RP Singh, R Ghosh - Multimedia Tools and Applications, 2020 - Springer
The Internet is used for exchanging information. Sometimes it is required to transmit
confidential data over the internet. Here the authors use image steganography to embed …

A secured image steganography method based on ballot transform and genetic algorithm

S Hossain, S Mukhopadhyay, B Ray, SK Ghosal… - Multimedia Tools and …, 2022 - Springer
Rapid advances in digital technology have facilitated us to transfer a huge amount of
electronic files over the internet. But in the presence of malicious attackers, the security, as …