Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

Big Data and cloud computing: innovation opportunities and challenges

C Yang, Q Huang, Z Li, K Liu, F Hu - International Journal of Digital …, 2017 - Taylor & Francis
Big Data has emerged in the past few years as a new paradigm providing abundant data
and opportunities to improve and/or enable research and decision-support applications with …

A review on text steganography techniques

MA Majeed, R Sulaiman, Z Shukur, MK Hasan - Mathematics, 2021 - mdpi.com
There has been a persistent requirement for safeguarding documents and the data they
contain, either in printed or electronic form. This is because the fabrication and faking of …

11 Survey of Image Steganography and Steganalysis

M Bachrach, FY Shih - Multimedia Security: Watermarking …, 2012 - api.taylorfrancis.com
The term, steganography, comes from Greek and means “covered writing”(Johnson and
Jajodia, 1998a; Petitcolas et al., 1999). The intent of steganography is to hide a message in …

[PDF][PDF] An overview of image steganography.

T Morkel, JHP Eloff, MS Olivier - ISSA, 2005 - academia.edu
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital …

Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

Security of medical images for telemedicine: a systematic review

M Magdy, KM Hosny, NI Ghali, S Ghoniemy - Multimedia Tools and …, 2022 - Springer
Recently, there has been a rapid growth in the utilization of medical images in telemedicine
applications. The authors in this paper presented a detailed discussion of different types of …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

An optimized steganography hiding capacity and imperceptibly using genetic algorithms

R Wazirali, W Alasmary, MMEA Mahmoud… - IEEE Access, 2019 - ieeexplore.ieee.org
In stenography, embedding data within an image has a trade-off between image quality and
embedding capacity. Specifically, the more data are concealed within a carrier image, the …

Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different …

BB Zaidan, AA Zaidan - Measurement, 2018 - Elsevier
This paper presents a comparative study of evaluation and benchmarking information hiding
approaches based on multi-measurement analysis using the Technique for Order of …