A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

K Muhammad, M Sajjad, I Mehmood, S Rho… - Multimedia Tools and …, 2016 - Springer
Image Steganography is a thriving research area of information security where secret data is
embedded in images to hide its existence while getting the minimum possible statistical …

CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method

K Muhammad, J Ahmad, NU Rehman, Z Jan… - Multimedia Tools and …, 2017 - Springer
Abstract Information hiding is an active area of research where secret information is
embedded in innocent-looking carriers such as images and videos for hiding its existence …

[PDF][PDF] Image steganography using least significant bit and secret map techniques.

A ALabaichi, MAAK Al-Dabbas… - International journal of …, 2020 - researchgate.net
In steganography, secret data are invisible in cover media, such as text, audio, video and
image. Hence, attackers have no knowledge of the original message contained in the media …

LSB‐XOR technique for securing captured images from disaster by UAVs in B5G networks

F Syed, SH Alsamhi, SK Gupta… - … and Computation: Practice …, 2024 - Wiley Online Library
Recently, unmanned aerial vehicles (UAV) technology has been utilized to monitor and
capture images from disasters to analyze, process, and take action in real‐time for a speedy …

Message security through aes and lsb embedding in edge detected pixels of 3d images

Y Moussa, W Alexan - 2020 2nd Novel Intelligent and Leading …, 2020 - ieeexplore.ieee.org
This paper proposes an advanced scheme of message security in 3D cover images using
multiple layers of security. Cryptography using AES-256 is implemented in the first layer. In …

A novel color image LSB steganography using improved 1D chaotic map

C Pak, J Kim, K An, C Kim, K Kim, C Pak - Multimedia Tools and …, 2020 - Springer
Abstract Conventional one-dimensional (1D) chaotic map have a simple structure, which is
easy to implement and has a low computational cost, but has a drawback that the range of …

A new data hiding method based on chaos embedded genetic algorithm for color image

Ş Doğan - Artificial Intelligence Review, 2016 - Springer
Data hiding algorithms, which have many methods describing in the literature, are widely
used in information security. In data hiding applications, optimization techniques are utilized …