A systematic review on cover selection methods for steganography: Trend analysis, novel classification and analysis of the elements

MHN Azam, F Ridzuan, MNSM Sayuti, AH Azni… - Computer Science …, 2025 - Elsevier
Cover selection is the process of selecting a suitable cover for steganography. Cover
selection is crucial to maintain the steganographic characteristics performances and further …

[HTML][HTML] FuzConvSteganalysis: Steganalysis via fuzzy logic and convolutional neural network

NJ De La Croix, T Ahmad - SoftwareX, 2024 - Elsevier
Emerging technologies based on the advancements in Deep Learning (DL) induced several
alternative approaches to address intricate problems, such as analyzing images in the …

Advanced audio coding steganography algorithm with distortion minimization model based on audio beat

X Zhang, C Li, L Tian - Computers and Electrical Engineering, 2023 - Elsevier
Currently, most advanced audio coding (AAC) steganography methods are content-non-
adaptive without considering the characteristics of audio, and there are several limitations in …

Ameliorating LSB using piecewise linear chaotic map and one-time pad for superlative capacity, imperceptibility and secure audio steganography

HT Elshoush, MM Mahmoud - IEEE Access, 2023 - ieeexplore.ieee.org
Audio steganography hides a secret message into an audio. Existing techniques are lacking
in achieving high payload, imperceptibility in addition to robustness at the same time. They …

From covert hiding to visual editing: robust generative video steganography

X Mao, X Hu, W Peng, Z Gan, Z Qian… - Proceedings of the 32nd …, 2024 - dl.acm.org
Traditional video steganography methods are based on modifying the covert space for
embedding, whereas we propose an innovative approach that embeds secret message …

Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism

MA Al Sibahee, ZA Abduljabbar, C Luo, J Zhang… - Plos one, 2024 - journals.plos.org
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …

A simple and efficient data hiding method with error detection and correction

H Chi, JC Liu, CC Chang, JH Horng - Electronics, 2024 - mdpi.com
In recent years, data hiding techniques have emerged as a prominent area of research due
to the increasing demand for information security. Existing data hiding techniques typically …

A deep learning-driven multi-layered steganographic approach for enhanced data security

Y Sanjalawe, S Al-E'mari, S Fraihat, M Abualhaj… - Scientific Reports, 2025 - nature.com
In the digital era, ensuring data integrity, authenticity, and confidentiality is critical amid
growing interconnectivity and evolving security threats. This paper addresses key limitations …

A combination of RSA algorithm with image steganography to ensure enhanced encryption

B Karthikeyan, B Bharathkumar… - … on Electronics and …, 2023 - ieeexplore.ieee.org
Data is a collection of raw facts and there are lots of ways to protect it securely. Cryptography
and steganography play crucial roles in the protection of data in the modern world. In order …

A Robust Technique for Steganography of Enhanced Audio Signals

MA Nasr, W El-Shafai, ESM El-Rabaie… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Audio steganography is a tool for concealing data (a secret message) inside an audio signal
(a carrier). It is regarded as an essential approach for information security. This paper …