Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

K Muhammad, M Sajjad, I Mehmood, S Rho… - Multimedia Tools and …, 2016 - Springer
Image Steganography is a thriving research area of information security where secret data is
embedded in images to hide its existence while getting the minimum possible statistical …

A security management framework for big data in smart healthcare

P Sarosh, SA Parah, GM Bhat, K Muhammad - Big Data Research, 2021 - Elsevier
Big Data analytics in the medical sector can assist medical professionals to facilitate
improvement in healthcare. With the help of data analysis, clinical images of patients can be …

CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method

K Muhammad, J Ahmad, NU Rehman, Z Jan… - Multimedia Tools and …, 2017 - Springer
Abstract Information hiding is an active area of research where secret information is
embedded in innocent-looking carriers such as images and videos for hiding its existence …

[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …

A novel steganography technique for digital images using the least significant bit substitution method

S Rahman, J Uddin, HU Khan, H Hussain… - IEEE …, 2022 - ieeexplore.ieee.org
Communication has become a lot easier in this era of technology, development of high-
speed computer networks, and the inexpensive uses of Internet. Therefore, data …

Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare

S Gull, SA Parah, K Muhammad - Computer Communications, 2020 - Elsevier
Continuous technological progressions and huge investments are made for the realization
of the various goals in the Internet of Things (IoT) driven networks. Internet of Medical Things …

A secure method for color image steganography using gray-level modification and multi-level encryption

K Muhammad, J Ahmad, H Farman, Z Jan… - KSII Transactions on …, 2015 - koreascience.kr
Security of information during transmission is a major issue in this modern era. All of the
communicating bodies want confidentiality, integrity, and authenticity of their secret …

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

S Rahman, J Uddin, H Hussain, A Ahmed, AA Khan… - Scientific Reports, 2023 - nature.com
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …

Image steganography for authenticity of visual contents in social networks

K Muhammad, J Ahmad, S Rho, SW Baik - Multimedia Tools and …, 2017 - Springer
Social networks are major sources of image sharing and secret messaging among the
people. To date, such networks are not strictly bounded by copyright laws due to which …