Digital image steganography and steganalysis: A journey of the past three decades

Aditya Kumar Sahu 1  and Monalisa Sahu 2
  • 1 Department of Computer Science and Engineering, GMRIT, , 532127, Rajam, India
  • 2 School of Engineering and Technology (CSE), GIET University, 765022, Gunupur, India

Abstract

Steganography is the science and art of covert communication. Conversely, steganalysis is the study of uncovering the steganographic process. The evolution of steganography has been paralleled by the development of steganalysis. In this game of hide and seek, the two player’s steganography and steganalysis always want to break the other down. Over the past three decades, research has produced a plethora of remarkable image steganography techniques (ISTs). The major challenge for most of these ISTs is to achieve a fair balance between the metrics such as high hiding capacity (HC), better imperceptibility, and improved security. This study aims to present an exhaustive scrutiny of various ISTs from the classical to recent developments in the spatial domain, with respect to various image steganographic metrics. Further, the current status, recent developments, open challenges, and promising directions in this field are also highlighted.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] Martin A., Sapiro G., Seroussi G., Is image steganography natural?, IEEE Transactions on Image processing, 2005, 14(12), 2040-2050

  • [2] Kadhim I. J., Premaratne P., Vial P. J., Halloran B., Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research, Neurocomputing, 2019, 335, 299-326

  • [3] Cheddad A., Condell J., Curran K., Mc-Kevitt P., Digital image steganography: Survey and analysis of current methods, Signal processing, 2010, 90(3), 727-752

  • [4] Johnson N. F., Jajodia S., Exploring steganography: Seeing the unseen, Computer, 1998, 31(2), 26-34

  • [5] Hussain M., Wahab A. W. A., Idris Y. I. B., Ho A. T., Jung K. H., Image steganography in spatial domain: A survey, Signal Processing: Image Communication, 2018, 65, 46-66

  • [6] Atawneh S., Almomani A., Sumari P., Steganography in digital images: Common approaches and tools, IETE Technical Review, 2013, 30(4), 344-358

  • [7] Nisha C. D., Monoth T., Analysis of Spatial Domain Image Steganography Based on Pixel-Value Differencing Method, In Soft Computing for Problem Solving, Springer, Singapore, 2020, 385-397. https://doi.org/10.1007/978-981-15-0184-5_34

  • [8] Karampidis K., Kavallieratou E., Papadourakis G., A review of image steganalysis techniques for digital forensics, Journal of information security and applications, 2018, 40, 217-235

  • [9] Nissar A. Mir A. H., Classification of steganalysis techniques: A study, Digital Signal Processing, 2010, 20(6), 1758-1770

  • [10] Singh L. Singh A. K. Singh P. K., Secure data hiding techniques: a survey, Multimedia Tools and Applications, 2018, 1-21. https://doi.org/10.1007/s11042-018-6407-5s

  • [11] Subhedar M. S., Mankar V. H., Current status and key issues in image steganography: A survey, Computer science review, 2014, 13, 95-113

  • [12] Hussain M., Wahab A. W. A., Anuar N. B., Salleh R., Noor R. M., Pixel value differencing steganography techniques: Analysis and open challenge, In IEEE International Conference on Consumer Electronics-Taiwan, 2015, 21-22

  • [13] Sahu A. K., Swain G., A review on LSB substitution and PVD based image steganography techniques, Indonesian Journal of Electrical Engineering and Computer Science, 2016, 2(3), 712-719

  • [14] Kharrazi M., Sencar H. T., Memon N. D., Performance study of common image steganography and steganalysis techniques, Journal of Electronic Imaging, 2006, 15(4), 041104

  • [15] Li B., He, J., Huang J., Shi Y. Q., A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing, 2011, 2(2), 142-172

  • [16] Judge J. C., Steganography: past, present, future (No. UCRL-ID-151879), Lawrence Livermore National Lab., CA (US), 2001

  • [17] Amirtharajan R., Qin J., Rayappan J. B. B., Random image steganography and steganalysis: Present status and future directions, Information Technology Journal, 2012, 11, 566-576

  • [18] Kahn D., The history of steganography, In International Workshop on Information Hiding, Springer, Berlin, Heidelberg, 1996, 1-5

  • [19] Mishra M., Mishra P., Adhikary M. C., Digital image data hiding techniques: A comparative study, arXiv preprint arXiv:1408.3564, 2014

  • [20] Provos N., Honeyman P., Hide and seek: An introduction to steganography, IEEE security & privacy, 2003, 1(3), 32-44

  • [21] Petitcolas F. A., Anderson R. J., Kuhn M. G., Information hiding-a survey, Proceedings of the IEEE, 1999, 87(7), 1062-1078

  • [22] Vinodhini R. E., Malathi P., Kumar T. G., A survey on DNA and image steganography, In 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017, 1-7

  • [23] Wang H., Wang S., Cyber warfare: steganography vs. steganalysis, Communications of the ACM, 2004, 47(10), 76-82

  • [24] Altaay A. A. J., Sahib S. B., Zamani M., An introduction to image steganography techniques, In International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012, 122-126

  • [25] Abraham A., Paprzycki M., Significance of steganography on data security, In International Conference on Information Technology: Coding and Computing, 2004. Proceedings, ITCC 2004, 2004(2), 347-351

  • [26] Amirtharajan R., Rayappan J. B. B., Steganography-time to time: A review, Research Journal of Information Technology, 2013, 5(2), 53-66

  • [27] Pradhan A., Sahu A. K., Swain G., Sekhar K. R., Performance evaluation parameters of image steganography techniques, In International Conference on Research Advances in Integrated Navigation Systems (RAINS), 2016, 1-8

  • [28] Meng R., Cui Q., Yuan C., A survey of image information hiding algorithms based on deep learning, Computer Modeling in Engineering & Sciences, 2018, 117(3), 425-454

  • [29] Girdhar A., Kumar V., Comprehensive survey of 3D image steganography techniques, IET Image Processing, 2017, 12(1), 1-10

  • [30] Artz D., Digital steganography: hiding data within data, IEEE Internet computing, 2001, 5(3), 75-80

  • [31] Trivedi M. C., Sharma S., Yadav V. K., Analysis of several image steganography techniques in spatial domain: A survey, In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016, 84

  • [32] Jung K. H., A survey of reversible data hiding methods in dual images, IETE Technical Review, 2016, 33(4), 441-452

  • [33] Shi Y. Q., Li X., Zhang X., Wu H. T., Ma, B., Reversible data hiding: advances in the past two decades, IEEE Access, 2016, 4, 3210-3237

  • [34] Westfeld A., Pfitzmann A., Attacks on steganographic systems, In International workshop on information hiding, Springer, Berlin, Heidelberg, 1999, 61-76

  • [35] Mousavi S.M., Naghsh A., Manaf A. A., Abu-Bakar S. A. R., A robust medical image watermarking against salt and pepper noise for brain MRI images, Multimedia Tools and Applications, 2017, 76(7), 10313–10342

  • [36] Wang Z., Bovik A. C., A universal image quality index, IEEE signal processing letters, 2002, 9(3), 81-84

  • [37] Bagnall R. J., Reversing the steganography myth in terrorist operations: The asymmetrical threat of simple intelligence dissemination techniques using common tools, SANS Information Security Reading Room, 2002, 19

  • [38] Tirkel A. Z., Rankin G. A., Van-Schyndel R. M., Ho W. J., Mee N. R. A., Osborne, C. F., Electronic watermark, Digital Image Computing, Technology and Applications (DICTA’93), 1993, 666-673

  • [39] Simmons G. J., The prisoners’ problem and the subliminal channel, In Advances in Cryptology, Springer, Boston, MA, 1984, 51-67

  • [40] Fridrich J., Goljan M., Practical steganalysis of digital images: State of the art, Security and Watermarking of Multimedia Contents IV, International Society for Optics and Photonics, 2002, 4675, 1–14

  • [41] Zhang T., Ping X., A new approach to reliable detection of LSB steganography in natural images, Signal processing, 2003, 83(10), 2085-2093

  • [42] Xia Z., Wang X., Sun X., Liu Q., Xiong N., Steganalysis of LSB matching using differences between nonadjacent pixels, Multimedia Tools and Applications, 2016, 75(4), 1947-1962

  • [43] Zhang J., Xiong F., Zhang D., Steganalysis for LSB Matching Based on the Dependences Between Neighboring Pixels, Journal of multimedia, 2012, 7(5), https://doi.org/10.1002/sec.864

  • [44] Fridrich J., Goljan M., Du R., Reliable detection of LSB steganography in color and grayscale images, In Proceedings of the work-shop on Multimedia and security: new challenges, 2001, 27-30

  • [45] Ker A. D., Steganalysis of LSB matching in grayscale images, IEEE signal processing letters, 2005, 12(6), 441-444

  • [46] Fridrich J., Goljan M., Du R., Detecting LSB steganography in color, and gray-scale images, IEEE multimedia, 2001, 8(4), 22-28

  • [47] Ker A. D., Improved detection of LSB steganography in grayscale images, In International workshop on information hiding, Springer, Berlin, Heidelberg, 2004, 97-115

  • [48] Pevný T., Filler T., Bas P., Using high-dimensional image models to perform highly undetectable steganography, In International Workshop on Information Hiding, Springer, Berlin, Heidelberg, 2010, 161-177

  • [49] Pevny T., Bas P., Fridrich J., Steganalysis by subtractive pixel adjacency matrix, IEEE Transactions on information Forensics and Security, 2010, 5(2), 215-224

  • [50] Zhang H., Ping X., Xu M., Wang R., Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction, Science China Information Sciences, 2014, 57(4), 1-7

  • [51] Kurak C., Mc-Hugh J., A cautionary note on image downgrading, Proceedings Eighth Annual Computer Security Application Conference, 1992, 153-159

  • [52] Wang R. Z., Lin C. F., Lin J. C., Hiding data in images by optimal moderately-significant-bit replacement, Electronics Letters, 2000, 36(25), 2069-2070

  • [53] Chan C. K., Cheng L. M., Improved hiding data in images by optimal moderately-significant-bit replacement, Electronics Letters, 2001, 37(16), 1017-1018

  • [54] Wang R. Z., Lin C. F., Lin J. C., Image hiding by optimal LSB substitution and genetic algorithm, Pattern recognition, 2001, 34(3), 671-683

  • [55] Chan C. K., Cheng L. M., Hiding data in images by simple LSB substitution, Pattern recognition, 2004, 37(3), 469-474

  • [56] Chang C. C., Lin M. H., Hu Y. C., A fast and secure image hiding scheme based on LSB substitution, International journal of pattern recognition and artificial intelligence, 2002, 16(04), 399-416

  • [57] Zakaria A., Hussain M., Wahab A., Idris M., Abdullah N., Jung K. H., High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution, Applied Sciences, 2018, 8(11), 2199

  • [58] Yang H., Sun X., Sun G., A high-capacity image data hiding scheme using adaptive LSB substitution, Radioengineering, 2009, 18(4), 509-516

  • [59] Cheng-Hsing Y., Chi-Yao W., Shiuh-Jeng W., Hung-Min S., Adaptive data hiding in edge areas of images with spatial LSB domain systems, IEEE Transactions on Information Forensics and Security, 2008, 3(3), 488-497

  • [60] Gupta S., Goyal A., Bhushan B., Information hiding using least significant bit steganography and cryptography, International Journal of Modern Education and Computer Science, 2012, 4(6), 27-34

  • [61] Khan S., Ahmad N., Wahid M., Varying index varying bits substitution algorithm for the implementation of VLSB steganography, Journal of the Chinese Institute of Engineers, 2016, 39(1), 101-109

  • [62] Wu N. I., Hwang M. S., A novel LSB data hiding scheme with the lowest distortion, The Imaging Science Journal, 2017, 65(6), 371-378

  • [63] Sahu A. K., Swain G., A novel n-rightmost bit replacement image steganography technique, 3D Research, 2019, 10(1), 2

  • [64] Hussain M., Abdul W. A., Javed N., Jung K. H., Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images, Symmetry, 2016, 8(6), 41

  • [65] Sahu A. K., Swain G., A novel multi stego-image based data hiding method for gray scale image, Pertanika Journal of Science and Technology, 2019, 29(2), 753-768.

  • [66] Sahu A. K., Swain G., Babu E. S., Digital image steganography using bit flipping, Cybernetics and Information Technologies, 2018, 18(1), 69-80

  • [67] Shreelekshmi R., Wilscy M., Madhavan C. V., Undetectable least significant bit replacement steganography, Multimedia Tools and Applications, 2019, 78(8), 10565-10582

  • [68] Kim C., Shin D., Kim B. G., Yang C. N., Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP, Journal of Real-Time Image Processing, 2018, 14(1), 115-126

  • [69] Zhou R. G., Luo J., Liu X., Zhu C., Wei L., Zhang X., A novel quantum image steganography scheme based on LSB, International Journal of Theoretical Physics, 2018, 57(6), 1848-1863

  • [70] Sahu A. K., Swain G., Information hiding using group of bits substitution, International Journal on Communications Antenna and Propagation, 2017, 7(2), 162-167

  • [71] Swain G., Digital image steganography using variable length group of bits substitution, Procedia Computer Science, 2016, 85, 31-38

  • [72] Jung K. H., Data hiding of digital images based on bit position and parity bit, The Imaging Science Journal, 2012, 60(6), 329-337

  • [73] Laskar S. A., Hemachandran K., High Capacity data hiding using LSB Steganography and Encryption, International Journal of Database Management Systems, 2012, 4(6), 57

  • [74] Elmasry W., New LSB-based colour image steganography method to enhance the eflciency in payload capacity, security and integrity check, Sadhana, 2018, 43(5), 68

  • [75] Chakraborty S., Jalal A. S., Bhatnagar C., LSB based non blind predictive edge adaptive image steganography, Multimedia Tools and Applications, 2017, 76(6), 7973-7987

  • [76] Sharp T., An implementation of key-based digital signal steganography, In International Workshop on Information Hiding, Springer, Berlin, Heidelberg, 2001, 13-26

  • [77] Mielikainen J., LSB matching revisited, IEEE signal processing letters, 2006, 13(5), 285-287

  • [78] Sahu A. K., Swain G., An improved data hiding technique using bit differencing and LSB matching, Internetworking Indonesia Journal, 2018, 10(1), 17-21

  • [79] Sabeti V., Samavi S., Shirani S., An adaptive LSB matching steganography based on octonary complexity measure, Multimedia tools and applications, 2013, 64(3), 777-793

  • [80] Juneja M., Sandhu P. S., Designing of robust image steganography technique based on LSB insertion and encryption, In International Conference on Advances in Recent Technologies in Communication and Computing, 2009, 302-305

  • [81] Swain G., Lenka S. K., A novel steganography technique by mapping words with LSB array, International Journal of Signal and Imaging Systems Engineering, 2015, 8(1-2), 115-122

  • [82] Swain G., Lenka, S. K., LSB array based image steganography technique by exploring the four least significant bits, In International Conference on Computing and Communication Systems, Springer, Berlin, Heidelberg, 2011, 479-488

  • [83] Alshayeji M. H., Al-Roomi S. A., Abed S. E., A high-capacity and secure least significant bit embedding approach based on word and letter frequencies, Security and Communication Networks, 2016, 9(18), 5764-5788

  • [84] Jung K. H., Yoo K. Y., Steganographic method based on interpolation and LSB substitution of digital images, Multimedia Tools and Applications, 2015, 74(6), 2143-2155

  • [85] Lee Y. K., Chen L. H., High capacity image steganographic model, IEE Proceedings-Vision, Image and Signal Processing, 2000, 147(3), 288-294

  • [86] Rengarajan A., K., Infant A. K., Rayappan J. B. B., High performance pixel indicator for colour image steganography, Information Technology, 2013, 5(3), 277-290

  • [87] Laimeche L., Meraoumia A., Bendjenna H., Enhancing LSB embedding schemes using chaotic maps systems, Neural Computing and Applications, 2019, 1-19. https://doi.org/10.1007/s00521-019-04523-z (in press)

  • [88] Tavares J. R. C., Junior F. M. B., Word-Hunt: A LSB steganography method with low expected number of modifications per pixel, IEEE Latin America Transactions, 2016, 14(2), 1058-1064

  • [89] Sarreshtedari S., Akhaee M. A., One-third probability embedding: a new±1 histogram compensating image least significant bit steganography scheme, IET image processing, 2013, 8(2), 78-89

  • [90] Muhammad K., Ahmad J., Rehman N. U., Jan Z., Sajjad M., CISSKALSB: color image steganography using stego key-directed adaptive LSB substitution method, Multimedia Tools and Applications, 2017, 76(6), 8597-8626

  • [91] Wang Z. H., Chang C. C., Li M. C., Optimizing least-significant-bit substitution using cat swarm optimization strategy, Information Sciences, 2012, 192, 98-108.

  • [92] Qazanfari K., Safabakhsh R., A new steganography method which preserves histogram: Generalization of LSB++, Information Sciences, 2014, 277, 90-101

  • [93] Parvez M. T., Gutub A. A. A., RGB intensity based variable-bits image steganography, In IEEE Asia-Pacific Services Computing Conference, 2008, 1322-1327

  • [94] Wu D. C., Tsai W. H., A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 2003, 24(9-10), 1613-1626

  • [95] Yang C. H., Weng C. Y., Tso H. K., Wang S. J., A data hiding scheme using the varieties of pixel-value differencing in multimedia images, Journal of Systems and Software, 2011, 84(4), 669-678

  • [96] Chang K. C., Chang C. P., Huang P. S., Tu T. M., A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing, Journal of multimedia, 2008, 3(2), 37-44

  • [97] Hussain M., Wahab A. W. A., Ho A. T., Javed N., Jung K. H., A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement, Signal Processing: Image Communication, 2017, 50, 44-57

  • [98] Tseng H. W., Leng H. S., A steganographic method based on pixel-value differencing and the perfect square number, Journal of Applied Mathematics, 2013, Article ID 189706, 1-8, http://doi.org/10.1155/2013/189706

  • [99] Swain G., Adaptive pixel value differencing steganography using both vertical and horizontal edges, Multimedia Tools and Applications, 2016, 75(21), 13541-13556

  • [100] Hong W., Chen T. S., Luo C. W., Data embedding using pixel value differencing and diamond encoding with multiple-base notational system, Journal of Systems and Software, 2012, 85(5), 1166-1175

  • [101] Lee Y. P., Lee J. C., Chen W. K., Chang K. C., Su J., Chang C. P., High-payload image hiding with quality recovery using tri-way pixel-value differencing, Information Sciences, 2012, 191, 214-225

  • [102] Chang C. C., Chuang J. C., Hu, Y. C., Spatial domain image hiding scheme using pixel-values differencing, Fundamenta Informaticae, 2006, 70(3), 171-184

  • [103] Luo W., Huang F., Huang J., A more secure steganography based on adaptive pixel-value differencing scheme, Multimedia tools and applications, 2011, 52(2-3), 407-430

  • [104] Balasubramanian C., Selvakumar S., Geetha S., High payload image steganography with reduced distortion using octonary pixel pairing scheme, Multimedia tools and applications, 2014, 73(3), 2223-2245

  • [105] Swain G., Adaptive and non-adaptive PVD steganography using overlapped pixel blocks, Arabian Journal for Science and Engineering, 2018, 43(12), 7549-7562

  • [106] Hameed M. A., Aly S., Hassaballah M., An eflcient data hiding method based on adaptive directional pixel value differencing (ADPVD), Multimedia Tools and Applications, 2018, 77(12), 14705-14723

  • [107] Grajeda-Marin I. R., Montes-Venegas H. A., Marcial-Romero J. R., Hernandez-Servin J. A., De-Ita G., An optimization approach to the TWPVD method for digital image steganography, In Mexican Conference on Pattern Recognition, Springer, Cham, 2016, 125-134

  • [108] Hosam O., Ben Halima N., Adaptive block-based pixel value differencing steganography, Security and Communication Networks, 2016, 9(18), 5036-5050

  • [109] Prasad S., Pal A. K., An RGB colour image steganography scheme using overlapping block-based pixel-value differencing, Royal Society Open Science, 2017, 4(4), 161066

  • [110] Jung K. H., Yoo K. Y., High-capacity index based data hiding method, Multimedia Tools and Applications, 2015, 74(6), 2179-2193.

  • [111] Lu H. C., Chu Y. P., Hwang M. S., New steganographic method of pixel value differencing. Journal of Imaging Science and Technology, 2006, 50(5), 424-426

  • [112] Liu H. H., Lin Y. C., Lee C. M., A digital data hiding scheme based on pixel-value differencing and side match method, Multimedia Tools and Applications, 2019, 78(9), 12157-12181

  • [113] Grajeda-Marín I. R., Montes-Venegas H. A., Marcial-Romero J. R., Hernández-Servín J. A., Muñoz-Jiménez V., Luna G. D. I., A New Optimization Strategy for Solving the Fall-Off Boundary Value Problem in Pixel-Value Differencing Steganography, International Journal of Pattern Recognition and Artificial Intelligence, 2018, 32(01), 1860010

  • [114] Mandal J., Das D., Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow, In Second international conference on computer science, engineering and applications (CCSEA), 2012, 93–102

  • [115] Kim P. H., Yoon E. J., Ryu K. W., Jung K. H., Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images, Security and Communication Networks, 2019, https://doi.org/10.1155/2019/9038650 (in press)

  • [116] Zhang X., Wang S., Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, 2004, 25(3), 331-339

  • [117] Wu H. C., Wu N. I., Tsai C. S., Hwang M. S., Image steganographic scheme based on pixel-value differencing and LSB replacement methods, IEE Proceedings-Vision, Image and Signal Processing, 2005, 152(5), 611-615

  • [118] Yang C. H., Weng C. Y., Wang S. J., Sun H. M., Varied PVD+ LSB evading detection programs to spatial domain in data embedding systems, Journal of Systems and Software, 2010, 83(10), 1635-1643

  • [119] Gulve A. K., Joshi M. S., A high capacity secured image steganography method with five pixel pair differencing and LSB substitution, International Journal of Image, Graphics and Signal Processing, 2015, 7(5), 66-74

  • [120] Swain G., Digital image steganography using nine-pixel differ-encing and modified LSB substitution, Indian Journal of Science and Technology, 2014, 7(9), 1444-1450

  • [121] Darabkh K. A., Al-Dhamari A. K., Jafar I. F., A new steganographic algorithm based on multi directional PVD and modified LSB, Information Technology and Control, 2017, 46(1), 16-36

  • [122] Khodaei M., Faez K., New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing., IET Image processing, 2012, 6(6), 677-686

  • [123] Hussain M., Wahab A. W. A., Javed N., Jung K. H., Recursive information hiding scheme through LSB, PVD shift, and MPE, IETE Technical Review, 2018, 35(1), 53-63

  • [124] Shukla A. K., Singh A., Singh B., Kumar A., A secure and high-capacity data-hiding method using compression, encryption and optimized pixel value differencing, IEEE Access, 2018, 6, 51130-51139

  • [125] Jung K. H., Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane, Journal of Real-Time Image Processing, 2018, 14(1), 127-136

  • [126] Khodaei M., Sadeghi B. B., Faez K., Adaptive data hiding, using pixel-value-differencing and LSB substitution, Cybernetics and Systems, 2016, 47(8), 617-628

  • [127] Liao X., Wen Q. Y., Zhang J., A steganographic method for digital images with four-pixel differencing and modified LSB substitution, Journal of Visual Communication and Image Representation, 2011, 22(1), 1-8

  • [128] Yang C. H., Weng C. Y., Wang S. J., Sun H. M., Adaptive data hiding in edge areas of images with spatial LSB domain systems, IEEE Transactions on Information Forensics and Security, 2008, 3(3), 488-497

  • [129] Kalita M., Tuithung T., Majumder S., An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique, Cryptologia, 2019, 1-24, https://doi.org/10.1080/01611194.2019.1579122 (in press)

  • [130] Jung K. H., Ha K. J., Yoo K. Y., Image data hiding method based on multi-pixel differencing and LSB substitution methods, In International Conference on Convergence and Hybrid Information Technology, 2008, 355-358

  • [131] Gulve A. K., Joshi M. S., An Image Steganography Method Resistive to fall off Boundary Value Problem with Five Pixel Pair Differ-encing, Journal of Mathematics and Computer Science, 2015, 5, 240-251

  • [132] Sahu A. K., Swain G., Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis, International Journal of Electronic Security and Digital Forensics, 2019, 11(4), 458-476

  • [133] Halder T., Karforma S., Mandal R., A Block-Based Adaptive Data Hiding Approach Using Pixel Value Difference and LSB Substitution to Secure E-Governance Documents, Journal of Information Processing Systems, 2019, 15(2), 1-8

  • [134] Wang C. M., Wu N. I., Tsai C. S., Hwang M. S., A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software, 2008, 81(1), 150-158

  • [135] Joo J. C., Lee H. Y., Lee H. K., Improved steganographic method preserving pixel-value differencing histogram with modulus function, EURASIP Journal on Advances in Signal Processing, 2010, 2010(1), 249826

  • [136] Xu W. L., Chang C. C., Chen T. S., Wang L. M., An improved least-significant-bit substitution method using the modulo three strategy, Displays, 2016, 42, 36-42

  • [137] Li Z., He Y., Steganography with pixel-value differencing and modulus function based on PSO, Journal of information security and applications, 2018, 43, 47-52

  • [138] Swain G., A data hiding technique by mixing MFPVD and LSB substitution in a pixel, Information Technology and Control, 2018, 47(4), 714-727

  • [139] Swain G., Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function, Optik, 2019, 180, 807-823

  • [140] Swain G., Very high capacity image steganography technique using quotient value differencing and LSB substitution, Arabian Journal for Science and Engineering, 2019, 44(4), 2995-3004

  • [141] Liao X., Wen Q., Zhang J., Improving the adaptive stegano-graphic methods based on modulus function, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, 96(12), 2731-2734

  • [142] Al-Dhamari A. K., Darabkh K. A., Block-based steganographic algorithm using modulus function and pixel-value differencing, Journal of Software Engineering and Applications, 2017, 10(1), 1-12.

  • [143] Sairam T. D., Boopathybagan K., An improved high capacity data hiding scheme using pixel value adjustment and modulus operation, Multimedia Tools and Applications, 2019, 1-11, https://doi.org/10.1007/s11042-019-7557-9 (in press)

  • [144] Shen S., Huang L., Tian Q., A novel data hiding for color images based on pixel value difference and modulus function, Multimedia Tools and Applications, 2015, 74(3), 707-728

  • [145] Lee C. F., Chen H. L., A novel data hiding scheme based on modulus function, Journal of Systems and Software, 2010, 83(5), 832-843

  • [146] Maleki N., Jalali M., Jahan M. V., Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function, Egyptian Informatics Journal, 2014, 15(2), 115-127

  • [147] Zhao W., Jie Z., Xin L., Qiaoyan W., Data embedding based on pixel value differencing and modulus function using indeterminate equation, The Journal of China Universities of Posts and Telecommunications, 2015, 22(1), 95-100

  • [148] Nagaraj V., Vijayalakshmi V., Zayaraz G., Color image steganography based on pixel value modification method using modulus function, IERI Procedia, 2013, 4, 17-24

  • [149] Sahu A. K., Swain G., An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function, Wireless Personal Communications, 2019, 108(1). 159-174

  • [150] Sahu A. K., Swain G., Pixel overlapping image steganography using PVD and modulus function, 3D Research, 2018, 9(3), 40

  • [151] Sahu A. K., Swain G., Digital Image Steganography using PVD and Modulo Operation, Internetworking Indonesian Journal, 2019, 10(2), 3-13

  • [152] Maniriho P., Ahmad T., Information hiding scheme for digital images using difference expansion and modulus function, Journal of King Saud University-Computer and Information Sciences, 2019, 31(3), 335-347

  • [153] Kuo W. C., Secure Modulus Data Hiding Scheme, KSII Transactions on Internet & Information Systems, 2013, 7(3), 600-612

  • [154] Pan F., Li J., Yang X., Image steganography method based on PVD and modulus function, In International Conference on Electronics, Communications and Control (ICECC), 2011, 282-284

  • [155] Liao X., Wen Q. Y., Zhao Z. L., Zhang J., A novel steganographic method with four-pixel differencing and modulus function, Fundamenta Informaticae, 2012, 118(3), 281-289

  • [156] Liao X., Wen Q., Zhang J., Improving the adaptive stegano-graphic methods based on modulus function, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, 96(12), 2731-2734

  • [157] Sun S., A novel edge based image steganography with 2k correction and Huffman encoding, Information Processing Letters, 2016, 116(2), 93-99

  • [158] Ioannidou A., Halkidis S. T., Stephanides G., A novel technique for image steganography based on a high payload method and edge detection, Expert systems with applications, 2012, 39(14), 11517-11524

  • [159] Karakis R., Guler İ., Capraz I., Bilir E., A novel fuzzy logic-based image steganography method to ensure medical data security, Computers in biology and medicine, 2015, 67, 172-183

  • [160] Dadgostar H., Afsari F., Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB, Journal of information security and applications, 2016, 30, 94-104

  • [161] Li L., Luo B., Li Q., Fang X., A color Images steganography method by multiple embedding strategy based on Sobel operator, In IEEE International Conference on Multimedia Information Networking and Security, 2009, 2, 118-121

  • [162] Kumar S., Singh A., Kumar M. Information hiding with adaptive steganography based on novel fuzzy edge identification. Defence Technology, 2019, 15(2), 162-169

  • [163] Lee C. F., Chang C. C., Xie X., Mao K., Shi R. H., An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes, Displays, 2018, 53, 30-39

  • [164] Bai J., Chang, C. C., Nguyen T. S., Zhu C., Liu Y., A high pay-load steganographic algorithm based on edge detection, Displays, 2017, 46, 42-51

  • [165] Tseng H. W., Leng H. S., High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion, IET Image Processing, 2014, 8(11), 647-654

  • [166] Roy R., Sarkar A., Changder S., Chaos based edge adaptive image steganography, Procedia Technology, 2013, 10, 138-146

  • [167] Modi M. R., Islam S., Gupta P., Edge based steganography on colored images, In International Conference on Intelligent Computing, Springer, Berlin, Heidelberg, 2013, 593-600

  • [168] Luo W., Huang F., Huang J., Edge adaptive image steganography based on LSB matching revisited, IEEE Transactions on Information Forensics and Security, 2010, 5(2), 201-214

  • [169] Bassil Y., Image steganography based on a parameterized canny edge detection algorithm, arXiv preprint arXiv:1212.6259, 2012

  • [170] Islam S., Modi M. R., Gupta P., Edge-based image steganography, EURASIP Journal on Information Security, 2014, 2014(1), 8

  • [171] Chan C. S., Chang C. Y., Hiding data in parity check bit. In Proceedings of the 4th International Conference on Uniquitous Information Management and Communication, 2010, 52

  • [172] Afsari F., Eslami E., Eslami P., Interval-valued intuitionistic fuzzy generators: Application to edge detection, Journal of Intelligent & Fuzzy Systems, 2014, 27(3), 1309-1324

  • [173] Al-Dmour H., Al-Ani A., A steganography embedding method based on edge identification and XOR coding, Expert systems with Applications, 2016, 46, 293-306

  • [174] Chen W. J., Chang C. C., Le T. H. N., High payload steganography mechanism using hybrid edge detector, Expert Systems with applications, 2010, 37(4), 3292-3301

  • [175] Jung K. H., Yoo K. Y., Data hiding using edge detector for scalable images, Multimedia tools and applications, 2014, 71(3), 1455-1468

  • [176] Alam S., Ahmad T., Doja M. N., A Novel Edge Based Chaotic Steganography Method Using Neural Network, In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, Springer, Singapore, 2017, 467-475

  • [177] Islam S., Gupta P., Robust edge based image steganography through pixel intensity adjustment, In IEEE International Conference on High Performance Computing and Communications, (HPCC, CSS, ICESS), 2014, 771-777

  • [178] Hong W., Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique, Information Sciences, 2013, 221, 473-489

  • [179] Barton J. M., Method and apparatus for embedding authentication information within digital data, U.S. Patent No. 5,646,997, Washington, DC: U.S. Patent and Trademark Oflce,1997

  • [180] Tian J., Reversible data embedding using a difference expansion, IEEE transactions on circuits and systems for video technology, 2003, 13(8), 890-896

  • [181] Alattar A. M., Reversible watermark using the difference expansion of a generalized integer transform, IEEE transactions on image processing, 2004, 13(8), 1147-1156

  • [182] Kim H. J., Sachnev V., Shi Y. Q., Nam J., Choo H. G., A novel difference expansion transform for reversible data embedding, IEEE Transactions on Information Forensics and Security, 2008, 3(3), 456-465

  • [183] Jana B., High payload reversible data hiding scheme using weighted matrix, Optik-International Journal for Light and Electron Optics, 2016, 127(6), 3347-3358

  • [184] Qin C., Chang C. C., Hsu T. J., Reversible data hiding scheme based on exploiting modification direction with two stegano-graphic images, Multimedia Tools and Applications, 2015, 74(15), 5861-5872

  • [185] Nguyen T. S., Chang C. C., A reversible data hiding scheme based on the Sudoku technique, Displays, 2015, 39, 109-116

  • [186] Chang C. C., Nguyen T. S., Lin C. C., Reversible data embedding for indices based on histogram analysis, Journal of Visual Communication and Image Representation, 2014, 25(7), 1704-1716

  • [187] Liu W. L., Leng H. S., Huang C. K., Chen D. C., A block-based division reversible data hiding method in encrypted images, Symmetry, 2017, 9(12), 308

  • [188] Parah S. A., Ahad F., Sheikh J. A., Loan N. A., Bhat G. M., A New Reversible and high capacity data hiding technique for E-healthcare applications, Multimedia Tools and Applications, 2017, 76(3), 3943-3975

  • [189] Kumar R., Chand S., A novel high capacity reversible data hiding scheme based on pixel intensity segmentation, Multimedia Tools and Applications, 2017, 76(1), 979-996

  • [190] Hu J., Li T., Reversible steganography using extended image interpolation technique, Computers & Electrical Engineering, 2015, 46, 447-455

  • [191] Tang M., Hu J., Song W., Zeng S., Reversible and adaptive image steganographic method, AEU-International Journal of Electronics and Communications, 2015, 69(12), 1745-1754

  • [192] Sahu A. K., Swain G., High fidelity based reversible data hiding using modified LSB matching and pixel difference, Journal of King Saud University-Computer and Information Sciences, 2019, https://doi.org/10.1016/j.jksuci.2019.07.004 (in press)

  • [193] Sahu A. K., Swain G., Dual Stego-imaging based Reversible Data Hiding using Improved LSB Matching, International Journal of Intelligent Engineering and Systems, 2019, 12(5), 2019, 63-73

  • [194] Chang C. C., Lu T. C., A difference expansion oriented data hiding scheme for restoring the original host images, Journal of Systems and Software, 2006, 79(12), 1754-1766

  • [195] Chang C. C., Kieu T. D., Chou Y. C., Reversible data hiding scheme using two steganographic images, In TENCON, IEEE Region 10 Conference, 2007, 1-4

  • [196] Wu M. N., Chang C. C., A novel high capacity reversible information hiding scheme based on side-match prediction and shortest spanning path, Circuits, Systems & Signal Processing, 2008, 27(2), 137-153

  • [197] Li J. J., Lee C. F., Chang C. C., Lin J. Y., Wu Y. H., Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering, IEEE Access, 2019, 7, 142947-142962

  • [198] Lin J. Y., Liu Y., Chang C. C., A real-time dual-image-based reversible data hiding scheme using turtle shells, Journal of Real-Time Image Processing, 2019, 16(3), 673-684

  • [199] Lin J. Y., Chen Y., Chang C. C., Hu Y. C., Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction, Multimedia Tools and Applications, 2019, 1-18. https://doi.org/10.1007/s11042-019-07783-y (in press)

  • [200] Xie X. Z., Chang C. C., Lin C. C., Lin J. L., A Turtle Shell based RDH scheme with two-dimensional histogram shifting, Multimedia Tools and Applications, 2019, 1-24. https://doi.org/10.1007/s11042-018-7098-7 (in press)

  • [201] Lu T. C., Tseng C. Y., Wu J. H., Dual imaging-based reversible hiding technique using LSB matching, Signal Processing, 2015, 108, 77-89

  • [202] Wang W., Ye J., Wang T., Wang W., A high capacity reversible data hiding scheme based on right-left shift, Signal Processing, 2018, 150, 102-115

  • [203] Wang Y. L., Shen J. J., Hwang M. S., An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching, International Journal of Network Security, 2017, 19(5), 858-862

  • [204] Ni Z., Shi Y. Q., Ansari N., Su W., (2006). Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3), 354-362

  • [205] Sahu A.K., Swain, G., Reversible Image Steganography Using Dual-Layer LSB Matching, Sensing and Imaging, 2020, 21:1, https://doi.org/10.1007/s11220-019-0262-y (in press)

  • [206] Wang Y., Cai Z., He W., A New High Capacity Separable Reversible Data Hiding in Encrypted Images Based on Block Selection and Block-Level Encryption, IEEE Access, 2019, 7, 175671-175680

  • [207] Tai W. L., Yeh C. M., Chang C. C., Reversible data hiding based on histogram modification of pixel differences, IEEE Transactions on Circuits and Systems for video technology, 2009, 19(6), 906-910

  • [208] Hsiao J. Y., Chan K. F., Chang J. M., Block-based reversible data embedding, Signal Processing, 2009, 89(4), 556-569

  • [209] Liu Y., Qu X., Xin G., A ROI-based reversible data hiding scheme in encrypted medical images. Journal of Visual Communication and Image Representation, 2016, 39, 51-57

  • [210] Yao H., Mao F., Tang Z., Qin C., High-fidelity dual-image reversible data hiding via prediction-error shift, Signal Processing, 2019, 170, 107447. https://doi.org/10.1016/j.sigpro.2019.107447 (in press)

  • [211] Chang C. C., Lin C. C., Chen Y. H., Reversible data-embedding scheme using differences between original and predicted pixel values, IET information security, 2008, 2(2), 35-46

  • [212] Wang W., A reversible data hiding algorithm based on bidirectional difference expansion, Multimedia Tools and Applications, 2019, 1-24. DOI:10.1007/s11042-019-08255-z (in press)

  • [213] Jung K. H., High-capacity reversible data hiding method using block expansion in digital images, Journal of Real-Time Image Processing, 2018, 14(1), 159-170

  • [214] Lu T. C., Chang C. C., Huang Y. H., High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting, Multimedia tools and applications, 2014, 72(1), 417-435

  • [215] Duan X., Jia K., Li B., Guo D., Zhang E., Qin C., Reversible image steganography scheme based on a U-Net structure, IEEE Access, 2019, 7, 9314-9323

  • [216] Hong W., Chen T. S., Shiu C. W., Reversible data hiding for high quality images using modification of prediction errors, Journal of Systems and Software, 2009, 82(11), 1833-1842

  • [217] Pan Z., Hu S., Ma X., Wang L., Reversible data hiding based on local histogram shifting with multilayer embedding, Journal of Visual Communication and Image Representation, 2015, 31, 64-74

  • [218] Li X., Zhang W., Gui X., Yang B., A novel reversible data hiding scheme based on two-dimensional difference-histogram modification, IEEE Transactions on Information Forensics and Security, 2013, 8(7), 1091-1100

  • [219] Di F., Zhang M., Liao X., Liu J., High-fidelity reversible data hiding by Quadtree-based pixel value ordering, Multimedia Tools and Applications, 2019, 78(6), 7125-7141

  • [220] Liao X., Shu C., Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels, Journal of Visual Communication and Image Representation, 2015, 28, 21-27

  • [221] Malik A., Sikka G., Verma H. K., An image interpolation based reversible data hiding scheme using pixel value adjusting feature, Multimedia Tools and Applications, 2017, 76(11), 13025-13046

  • [222] He W., Xiong G., Weng S., Cai Z., Wang Y., Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion, Information Sciences, 2018, 467, 784-799

  • [223] He W., Zhou K., Cai J., Wang L., Xiong G., Reversible data hiding using multi-pass pixel value ordering and prediction-error expansion, Journal of Visual Communication and Image Representation, 2017, 49, 351-360

  • [224] Tsai Y. Y., Tsai D. S., Liu C. L., Reversible data hiding scheme based on neighboring pixel differences, Digital Signal Processing, 2013, 23(3), 919-927

  • [225] Abbasi R., Xu L., Amin F., Luo B., Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization, Security and Communication Networks, 2019, https://doi.org/10.1155/2019/8981240 (in press)

  • [226] Tsai P., Hu Y. C., Yeh H. L., Reversible image hiding scheme using predictive coding and histogram shifting, Signal Processing, 2009, 89(6), 1129-1143

  • [227] Wang J., Ni J., Zhang X., Shi Y. Q., Rate and distortion optimization for reversible data hiding using multiple histogram shifting, IEEE Transactions on Cybernetics, 2016, 47(2), 315-326

  • [228] Xie X. Z., Chang C. C., Lin C. C., A hybrid reversible data hiding for multiple images with high embedding capacity, IEEE Access, 2019, 10.1109/ACCESS.2019.29 61764 (in press)

  • [229] Chang C. C., Tseng H. W., A steganographic method for digital images using side match, Pattern Recognition Letters, 2004, 25(12), 1431-1437

  • [230] Chang C. C., Wu W. C., A novel data hiding scheme for keeping high stego-image quality, In 12th IEEE International Multi-Media Modelling Conference, 2006, 1-8

  • [231] Chang C. C., Chou Y. C., Kieu T. D., An information hiding scheme using Sudoku, In 3rd IEEE international conference on innovative computing information and control, 2008, 17-27

  • [232] He M., Liu Y., Chang C. C., He M., A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload, IEEE Access, 2019, 7, 141414-141425

  • [233] Liu Y., Chang C. C., Huang P. C., Security protection using two different image shadows with authentication, Mathematical biosciences and engineering, 2019, 16(4), 1914-1932

  • [234] Lin C. C., An information hiding scheme with minimal image distortion, Computer Standards & Interfaces, 2011, 33(5), 477-484

  • [235] Jung K. H., Yoo K. Y., Data hiding method using image interpolation, Computer Standards & Interfaces, 2009, 31(2), 465-470

  • [236] Xu H., Wang J., Kim H. J., Near-optimal solution to pair-wise LSB matching via an immune programming strategy, Information Sciences, 2010, 180(8), 1201-1217

  • [237] Xia B. B., Wang A. H., Chang C. C., Liu L., An Image Steganography Scheme Using 3D-Sudoku, Journal of Information Hiding and Multimedia Signal Processing, 2016, 7(4), 836-845

  • [238] Kuo W. C., Kuo S. H., Wang C. C., Wuu L. C., High capacity data hiding scheme based on multi-bit encoding function, Optik-International Journal for Light and Electron Optics, 2016, 127(4), 1762-1769

  • [239] Wazirali R., Alasmary W., Mahmoud M. M., Alhindi A., An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms,IEEE Access, 2019, 7, 133496-133508

  • [240] Nguyen T. D., Arch-Int S., Arch-Int N., An adaptive multi bit-plane image steganography using block data-hiding, Multimedia tools and applications, 2016, 75(14), 8319-8345

  • [241] Amirtharajan R., Rayappan J. B. B., An intelligent chaotic embedding approach to enhance stego-image quality, Information Sciences, 2012, 193, 115-124

  • [242] Younus Z. S., Hussain M. K., Image steganography using exploiting modification direction for compressed encrypted data, Journal of King Saud University-Computer and Information Sciences, 2019, https://doi.org/10.1016/j.jksuci.2019.04.008 (in press)

  • [243] Kuo W. C., Li J. J., Wang C. C., Analysis of overflow in data hiding based on extraction function, Journal of Innovative Technology, 2019, 1(2), 21-25

  • [244] Kuo W. C., Kuo S. H., Huang Y. C., Data hiding schemes based on the formal improved exploiting modification direction method, Applied Mathematics & Information Sciences Letters, 2013, 1(3), 1-8

  • [245] Kuo W. C., Wang C. C., Data hiding based on generalised exploiting modification direction method, The Imaging Science Journal, 2013, 61(6), 484–490

  • [246] Kuo W. C., Kao M. C., A steganographic scheme based on formula fully exploiting modification directions, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, 96(11), 2235-2243

  • [247] Shen S.Y., Huang L.H., A data hiding scheme using pixel value differencing and improving exploiting modification directions, Computers & Security, 2015, 48, 131–141

  • [248] Liu Y., Yang C., Sun Q., Enhance embedding capacity of generalized exploiting modification directions in data hiding, IEEE Access, 2017, 6, 5374-5378

  • [249] Kieu T. D., Chang C. C., A steganographic scheme by fully exploiting modification directions, Expert systems with Applications, 2011, 38(8), 10648-10657

  • [250] Biswas R., Mukherjee I., Bandyopadhyay S. K., Image feature based high capacity steganographic algorithm, Multimedia Tools and Applications, 2019, 1-18. https://doi.org/10.1007/s11042-019-7369-y (in press)

  • [251] Verma V., Muttoo S. K., Singh V. B., Enhanced payload and trade-off for image steganography via a novel pixel digits alteration, Multimedia Tools and Applications, 2019, 1-20. DOI: 10.1007/s11042-019-08283-9

  • [252] Vanmathi C., Prabu S., Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility, International Journal of Fuzzy Systems, 2018, 20(2), 460-473

  • [253] Wu K. S., Liao W. D., Lin C. N., Chen T. S., A high payload hybrid data hiding scheme with LSB, EMD and MPE, The Imaging Science Journal, 2015, 63(3), 174-181

  • [254] Yang C. Y., Wang W. F., Block-based colour image steganography using smart pixel-adjustment, In Genetic and Evolutionary Computing, Springer, Cham, 2015, 145-154

  • [255] Chen J. A PVD-based data hiding method with histogram preserving using pixel pair matching, Signal Processing: Image Communication, 2014, 29(3), 375-384

  • [256] Muhammad K., Ahmad J., Farman H., Jan Z., A new image steganographic technique using pattern based bits shuffling and magic LSB for grayscale images, 2016, arXiv preprint arXiv:1601.01386

  • [257] Thanikaiselvan V., Santosh K., Manikanta D., Amirtharajan R., A new steganography algorithm against chi square attack, Research Journal of Information Technology, 2013, 5, 363-372

  • [258] Bandyopadhyay D., Dasgupta K., Mandal J. K., Dutta P., Ojha V. K., Snášel V., A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO), In Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA, Springer, Cham, 2014, 271-280

  • [259] Sajasi S., Moghadam A. M. E., A high quality image steganography scheme based on fuzzy inference system, In 13th Iranian Conference on Fuzzy Systems (IFSC), 2013, 1-6

  • [260] Das S., Sharma S., Bakshi S., Mukherjee I., A framework for pixel intensity modulation based image steganography, In Progress in Advanced Computing and Intelligent Engineering, Springer, Singapore, 2018, 3-14

  • [261] Niimi M., Noda H., Kawaguchi E., Eason R. O., High capacity and secure digital steganography to palette-based images, In Proceedings. International Conference on Image Processing, 2002, 2, II-II

  • [262] Banik B. G., Bandyopadhyay S. K., Image Steganography using BitPlane complexity segmentation and hessenberg QR method, In Proceedings of the First International Conference on Intelligent Computing and Communication, Springer, Singapore, 2017, 623-633

  • [263] Paul G., Davidson I., Mukherjee I., Ravi, S. S., Keyless steganography in spatial domain using energetic pixels, In International Conference on Information Systems Security, Springer, Berlin, Heidelberg, 2017, 134-148

  • [264] Paul G., Davidson I., Mukherjee I., Ravi S. S., Keyless dynamic optimal multi-bit image steganography using energetic pixels, Multimedia Tools and Applications, 2017, 76(5), 7445-7471

  • [265] Muhammad K., Ahmad J., Rho S., Baik S. W., Image steganography for authenticity of visual contents in social networks, Multimedia Tools and Applications, 2017, 76(18), 18985-19004

  • [266] Liao X., Qin Z., Ding L., Data embedding in digital images using critical functions, Signal Processing: Image Communication, 2017, 58, 146-156

  • [267] Yang C. H., Wang S. J., Weng C. Y., Capacity-raising steganography using multi-pixel differencing and pixel-value shifting operations, Fundamenta Informaticae, 2010, 98(2-3), 321-336

  • [268] Liao X., Guo S., Yin J., Wang H., Li X., Sangaiah, A. K., New cubic reference table based image steganography, Multimedia Tools and Applications, 2018, 77(8), 10033-10050

  • [269] Liao X., Yu Y., Li B., Li Z., Qin Z., A new payload partition strategy in color image steganography, IEEE Transactions on Circuits and Systems for Video Technology. 2019, 10.1109/TCSVT.2019.2896270 (in press)

  • [270] Liao X., Yin J., Two Embedding Strategies for Payload Distribution in Multiple Images Steganography, In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018, 1982-1986

  • [271] Liao X., Yin J., Guo S., Li X., Sangaiah A. K., Medical JPEG image steganography based on preserving inter-block dependencies, Computers & Electrical Engineering, 2018, 67, 320-329

  • [272] Al-Nofaie S. M. A., Gutub A. A. A., Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications, Multimedia Tools and Applications, 2019, 1-49. https://doi.org/10.1007/s11042-019-08025-x (in press)

  • [273] Al-Nofaie S., Gutub A., Al-Ghamdi M., Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces, Journal of King Saud University-Computer and Information Sciences, 2019, https://doi.org/10.1016/j.jksuci.2019.06 (in press)

  • [274] Gutub A. A. A., Alaseri K. A., Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing, Journal of King Saud University-Computer and Information Sciences, 2019, https://doi.org/10.1016/j.jksuci.2019.06. 014 (in press)

  • [275] Gutub A., Al-Juaid N., Multi-bits stego-system for hiding text in multimedia images based on user security priority, Journal of Computer Hardware Engineering, 2018, 1(2), 1-9

  • [276] Liu G., Liu W., Dai Y., Lian S., Adaptive steganography based on block complexity and matrix embedding, Multimedia systems, 2014, 20(2), 227-238

  • [277] Sun H. M., Weng C. Y., Lee C. F., Yang C. H., Anti-forensics with steganographic data embedding in digital images, IEEE Journal on selected areas in Communications, 2011, 29(7), 1392-1403

  • [278] Kuo W. C., Wang C. C., Hou H. C., Signed digit data hiding scheme, Information Processing Letters, 2016, 116(2), 183-191

  • [279] Hong W., Chen T. S., A novel data embedding method using adaptive pixel pair matching, IEEE transactions on information forensics and security, 2011, 7(1), 176-184

  • [280] Muhammad K., Ahmad J., Farman H., Jan Z., Sajjad M., Baik S. W., A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption, Transactions on Internet and Information Systems, 2015, 9(5), 1938-1962

  • [281] Kanan H. R., Nazeri B., A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm, Expert Systems with Applications, 2014, 41(14), 6123-6130

  • [282] El-Emam N. N., New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization, Computers & Security, 2015, 55, 21-45

  • [283] Chakraborty S., Jalal A. S., Bhatnagar C., Secret image sharing using grayscale payload decomposition and irreversible image steganography, Journal of Information Security and Applications, 2013, 18(4), 180-192

  • [284] Roy, R. Laha, S., Optimization of Stego Image retaining secret information using Genetic Algorithm with 8-connected PSNR, Procedia Computer Science, 2015, 60, 468-477

  • [285] Chang C. C., Liu Y., Nguyen T. S., A novel turtle shell based scheme for data hiding, In 2014 tenth international conference on intelligent information hiding and multimedia signal processing, 2014, 89-93

  • [286] Hamzah A. A., Khattab S., Bayomi H., A linguistic steganography framework using Arabic calligraphy, Journal of King Saud University-Computer and Information Sciences, 2019, https://doi.org/10.1016/j.jksuci.2019.04.015 (in press)

  • [287] Liu X., Lin C. C., Muhammad K., Al-Turjman F., Yuan S. M., Joint Data Hiding and Compression Scheme Based on Modified BTC and Image Inpainting, 2019, IEEE Access, 7, 116027-116037

  • [288] Muhammad K., Steganography: A Secure way for Transmission in Wireless Sensor Networks, 2015, arXiv preprint arXiv:1511.08865

  • [289] Muhammad K., Ahmad J., Farman H., Zubair M., A novel image steganographic approach for hiding text in color images using HSI color model, 2015, arXiv preprint arXiv:1503.00388

  • [290] Pan J. S., Li W., Yang C. S., Yan L. J., Image steganography based on subsampling and compressive sensing, Multimedia Tools and Applications, 2015, 74(21), 9191-9205

  • [291] Liu Y., Zhao H., Liu S., Feng C., Liu S., A robust and improved visual quality data hiding method for HEVC, IEEE Access, 2018, 6, 53984-53997

  • [292] Li N., Hu J., Sun R., Wang S., Luo Z., A high-capacity 3d steganography algorithm with adjustable distortion, IEEE Access, 2017, 5, 24457-24466

  • [293] Luo J., Zhou R. G., Luo G., Li Y., Liu G., Traceable Quantum Steganography Scheme Based on Pixel Value Differencing, Scientific reports, 2019, 9(1), 1-12.

  • [294] Liao X., Chen G., Yin J., Content-adaptive steganalysis for color images, Security and Communication Networks, 9(18), 2016, 5756-5763

  • [295] Liao X., Chen G., Li Q., Liu J., Improved WOW adaptive image steganography method, In International Conference on Algorithms and Architectures for Parallel Processing, Springer, Cham, 2015, 695-702

  • [296] Kaur M., Juneja M., Adaptive Block Based Steganographic Model with Dynamic Block Estimation with Fuzzy Rules, In Innovations in Computer Science and Engineering, Springer, Singapore, 2017, 167-176

  • [297] Muhammad K., Sajjad M., Mehmood I., Rho S., Baik S. W., A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image, Multimedia Tools and Applications, 2016, 75(22), 14867-14893

  • [298] Zhang X., Wang S., Eflcient Steganographic Embedding by Exploiting Modification direction, IEE Communications Letter, 2006, 10(11), 781–783

  • [299] Kaw J. A., Loan N. A., Parah S. A., Muhammad K., Sheikh J. A., Bhat G. M., A reversible and secure patient information hiding system for IoT driven e-health, International Journal of Information Management, 2019, 45, 262-275

  • [300] Shafi I., Noman M., Gohar M., Ahmad A., Khan M., Din S., Ahmad J., An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment, Soft Computing, 2018, 22(5), 1555-1567

  • [301] El-emam N. N., Embedding a large amount of information using high secure neural based steganography algorithm, International Journal of Information and Communication Engineering, 2008, 4(2), 2

  • [302] Hameed M. A., Hassaballah M., Aly S., Awad A. I., An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques, IEEE Access, 2019, 7, 185189-185204

  • [303] Liu Y., Chang C. C., Nguyen T. S., High capacity turtle shell-based data hiding, IET Image Processing, 2016, 10(2), 130-137

  • [304] Liu L., Chang C. C., Wang A., Data hiding based on extended turtle shell matrix construction method, Multimedia Tools and Applications, 2017, 76(10), 12233-12250

  • [305] Xie X. Z., Lin C. C., Chang C. C., Data hiding based on a two-layer turtle shell matrix, Symmetry, 2018, 10(2), 47

  • [306] Chang C. C., Chou Y. C., Kieu T. D., An information hiding scheme using Sudoku, In 3rd international conference on innovative computing information and control, 2008, 1-5. 10.1109/ICICIC.2008.149

  • [307] Kumar M. S., Mamatha E., Reddy C. S., Mukesh V., Reddy R. D., Data hiding with dual based reversible image using sudoku technique, In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017, 2166-2172

  • [308] Alface P. R., Macq B., From 3D mesh data hiding to 3D shape blind and robust watermarking: A survey, In Transactions on data hiding and multimedia security II, Springer, Berlin, Heidelberg, 2007, 91-115

  • [309] Thiyagarajan P., Natarajan V., Aghila G., Venkatesan V. P., Anitha R., Pattern based 3D image Steganography, 3D Research, 2013, 4(1), 1

  • [310] Cayre F., Macq B., Data hiding on 3-D triangle meshes, IEEE Transactions on signal Processing, 2003, 51(4), 939-949

  • [311] Tsai Y. Y., An adaptive steganographic algorithm for 3D polygonal models using vertex decimation. Multimedia Tools and Applications, 2014, 69(3), 859-876

  • [312] Ghamizi S., Cordy M., Papadakis M., Traon Y. L., Adversarial Embedding: A robust and elusive Steganography and Watermarking technique, 2019, arXiv preprint arXiv:1912.01487

  • [313] Kim J., Park H., Park J. I., CNN-based image steganalysis using additional data embedding, Multimedia Tools and Applications, 2019, 1-18. https://doi.org/10.1007/s11042-019-08251-3

  • [314] Baluja S., Hiding images in plain sight: Deep steganography, In Advances in Neural Information Processing Systems, 2017, 2069-2079

  • [315] Liu, L., Wang A., Chang C. C., Li, Z., A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding, International Journal of Network Security, 2017, 19(3), 327-334

  • [316] Zhang R., Dong S., Liu J., Invisible steganography via generative adversarial networks, Multimedia Tools and Applications, 2019, 78(7), 8559-8575

  • [317] Duan X., Jia K., Li B., Guo D., Zhang E., Qin C., Reversible image steganography scheme based on a U-Net structure, IEEE Access, 2019, 7, 9314-9323

  • [318] Duan X., Song H., Qin C., Khan M. K., Coverless steganography for digital images based on a generative model, Computers, Materials & Continua, 2018, 55(3), 483-493

  • [319] Atee H. A., Ahmad R., Noor N. M., Rahma A. M. S., Aljeroudi Y. Extreme learning machine based optimal embedding location finder for image steganography, PloS one, 2017, 12(2), e0170329

  • [320] Hu D., Wang L., Jiang W., Zheng S., Li B., A novel image steganography method via deep convolutional generative adversarial networks, IEEE Access, 2018, 6, 38303-38314

  • [321] Wu P., Yang Y., Li X., Stegnet: Mega image steganography capacity with deep convolutional network, Future Internet, 2018, 10(6), 54

  • [322] Li C., Jiang Y., Cheslyar M., Embedding image through generated intermediate medium using deep convolutional generative adversarial network, Computers, Materials & Continua, 2018, 56(2), 313-324

  • [323] Husien S., Badi H., Artificial neural network for steganography, Neural Computing and Applications, 2015, 26(1), 111-116

  • [324] Ghaleb Al-Jbara H. A., Mat-Kiah L. B., Jalab H. A., Increased capacity of image based steganography using artificial neural network, In AIP Conference Proceedings, 2012, 1482(1), 20-25

  • [325] Zhu J., Kaplan R., Johnson J., Fei-Fei L., Hidden: Hiding data with deep networks, In Proceedings of the European Conference on Computer Vision (ECCV), 2018, 657-672

  • [326] Qian Y., Dong J., Wang W., Tan T., Deep learning for steganalysis via convolutional neural networks, In Media Watermarking, Security, and Forensics. International Society for Optics and Photonics, 2015, 9409, 94090J

  • [327] Fridrich J., Kodovsky J., Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, 2012, 7(3), 868-882

  • [328] Ye J., Ni J., Yi Y., Deep learning hierarchical representations for image steganalysis, IEEE Transactions on Information Forensics and Security, 2017, 12(11), 2545-2557

  • [329] Hayes J., Danezis G., Generating steganographic images via adversarial training, In Advances in Neural Information Processing Systems, 2017, 1954-1963

  • [330] Sharma K., Aggarwal A., Singhania T., Gupta D., Khanna A., Hiding Data in Images Using Cryptography and Deep Neural Network, 2019, arXiv preprint arXiv:1912.10413

  • [331] Kim D. H., Lee H. Y., Deep Learning-Based Steganalysis Against Spatial Domain Steganography, In European Conference on Electrical Engineering and Computer Science (EECS), 2017, 1-4

  • [332] Ye J., Ni J., Yi Y., Deep learning hierarchical representations for image steganalysis, IEEE Transactions on Information Forensics and Security, 2017, 12(11), 2545-2557

  • [333] Ge S., Gao Y., Wang R., Least significant bit steganography detection with machine learning techniques, In Proceedings of the international workshop on Domain driven data mining, 2007, 24-32. https://doi.org/10.1145/1288552.1288556

  • [334] Berg G., Davidson I., Duan M. Y., Paul, G., Searching for Hidden Messages: Automatic Detection of Steganography, In IAAI, 2003, 51-56

  • [335] Wu S., Zhong S. H., Liu Y., Steganalysis via deep residual network, In IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS), 2016, 1233-1236

  • [336] Wu S., Zhong S., Liu Y., Deep residual learning for image steganalysis, Multimedia tools and applications, 2018, 77(9), 10437-10453

  • [337] Zhang Y., Zhang W., Chen K., Liu J., Liu Y., Yu N., Adversarial examples against deep neural network based steganalysis, In Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018, 67-72

  • [338] Kang S., Park H., Park J. I., CNN-Based Ternary Classification for Image Steganalysis, Electronics, 2019, 8(11), 122

  • [339] USC-SIPI Image Database. [Online]. Available: http://sipi.usc.edu/database/database.php?volume=misc

  • [341] Pevny T., Bas P., Fridrich J., Steganalysis by subtractive pixel adjacency matrix, IEEE Transactions on information Forensics and Security, 2010, 5(2), 215-224

  • [342] Fridrich J., Kodovsky J., Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, 2012, 7(3), 868-882

  • [343] Gutub A., Al-Ghamdi M., Hiding shares by multimedia image steganography for optimized counting-based secret sharing, Multimedia Tools and Applications, 2020, 1-35. DOI: 10.1007/s11042-019-08427-x (in press)

  • [344] Alanazi N., Khan E., Gutub A., Inclusion of Unicode Standard Seamless Characters to Expand Arabic Text Steganography for Secure Individual Uses, Journal of King Saud University-Computer and Information Sciences. 2020, https://doi.org/10.1016/j.jksuci.2020.04.011 (in press)

  • [345] Gutub A., Al-Juaid N., Khan E., Counting-based secret sharing technique for multimedia applications, Multimedia Tools and Applications, 2019, 78(5), 5591-5619

  • [346] Gutub A., Al-Shaarani F., Eflcient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons, Arabian Journal for Science and Engineering, 2020, 1-14. https://doi.org/10.1007/s13369-020-04413-w (in press)

  • [347] Al-Khodaidi T., Gutub A., Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability, Arabian Journal for Science and Engineering, 2020, https://doi.org/10.1007/s13369-020-04422-9 (in press)

  • [348] Al-Juaid N., Gutub A., Combining RSA and audio steganography on personal computers for enhancing security, SN Applied Sciences, 2019, 1(8), 830-841

OPEN ACCESS

Journal + Issues

Search