Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

Efficient deep CNN-based fire detection and localization in video surveillance applications

K Muhammad, J Ahmad, Z Lv… - … on Systems, Man …, 2018 - ieeexplore.ieee.org
Convolutional neural networks (CNNs) have yielded state-of-the-art performance in image
classification and other computer vision tasks. Their application in fire detection systems will …

Early fire detection using convolutional neural networks during surveillance for effective disaster management

K Muhammad, J Ahmad, SW Baik - Neurocomputing, 2018 - Elsevier
Fire disasters are man-made disasters, which cause ecological, social, and economic
damage. To minimize these losses, early detection of fire and an autonomous response are …

A new payload partition strategy in color image steganography

X Liao, Y Yu, B Li, Z Li, Z Qin - … on circuits and systems for video …, 2019 - ieeexplore.ieee.org
In traditional steganographic schemes, RGB three channels payloads are assigned equally
in a true color image. In fact, the security of color image steganography relates not only to …

A hybrid model of internet of things and cloud computing to manage big data in health services applications

M Elhoseny, A Abdelaziz, AS Salama, AM Riad… - Future generation …, 2018 - Elsevier
Over the last decade, there has been an increasing interest in big data research, especially
for health services applications. The adoption of the cloud computing and the Internet of …

Secure surveillance framework for IoT systems using probabilistic image encryption

K Muhammad, R Hamza, J Ahmad… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
This paper proposes a secure surveillance framework for Internet of things (IoT) systems by
intelligent integration of video summarization and image encryption. First, an efficient video …

Secure and robust fragile watermarking scheme for medical images

A Shehab, M Elhoseny, K Muhammad… - IEEE …, 2018 - ieeexplore.ieee.org
Due to the advances in computer-based communication and health services over the past
decade, the need for image security becomes urgent to address the requirements of both …

A privacy-preserving cryptosystem for IoT E-healthcare

R Hamza, Z Yan, K Muhammad, P Bellavista… - Information …, 2020 - Elsevier
Privacy preservation has become a prerequisite for modern applications in the cloud, social
media, Internet of things (IoT), and E-healthcare systems. In general, health and medical …