A systematic review on cover selection methods for steganography: Trend analysis, novel classification and analysis of the elements

MHN Azam, F Ridzuan, MNSM Sayuti, AH Azni… - Computer Science …, 2025 - Elsevier
Cover selection is the process of selecting a suitable cover for steganography. Cover
selection is crucial to maintain the steganographic characteristics performances and further …

Hlsnc-gan: medical image synthesis using hinge loss and switchable normalization in cyclegan

Y Heng, M Yinghua, FG Khan, A Khan, Z Hui - Ieee Access, 2024 - ieeexplore.ieee.org
In the field of medical image analysis, MRI and CT, among other multimodal medical
images, play crucial roles. To overcome the limitations of image acquisition, researchers …

A Method of Cover Audio Selection for Embedding Based on Various Criteria

MHN Azam, F Ridzuan, MNSM Sayuti… - ITM Web of …, 2024 - itm-conferences.org
The main goal of an audio steganography method is to improve the capacity, im-
perceptibility, and robustness. Several methods of audio steganography have been …

Improving Dynamic Security of the Least Significant Bit Using Block-Based Chaotic Multi-level LSB (BCM-LSB)

MHN Azam, F Ridzuan… - … Conference on Cyber …, 2023 - Springer
Abstract Least Significant Bit (LSB) embedding is one of the most common techniques used
in audio steganography. LSB audio steganographic techniques have poor dynamic security …

Improving Dynamic Security of the Least Significant Bit Using Block-Based

MNSM Sayuti, AH Azni, NH Zakaria - AI Applications in Cyber …, 2024 - books.google.com
Abstract Least Significant Bit (LSB) embedding is one of the most common tech-niques used
in audio steganography. LSB audio steganographic techniques have poor dynamic security …

A new type of audio steganography with increased privacy using different ratios of LSB embedding

PK Dutta, AR Javed, KTT Amesho… - 6th Smart Cities …, 2022 - ieeexplore.ieee.org
The technique known as steganography was used to hide theory and application. The secret
message or plain text can be concealed in one way or another. Steganography techniques …