A Systematic Review of Computational Image Steganography Approaches

[1]  Sandeep Saini,et al.  Stock values predictions using deep learning based hybrid models , 2021, CAAI Trans. Intell. Technol..

[2]  Rui Chen,et al.  Image-denoising algorithm based on improved K-singular value decomposition and atom optimization , 2021, CAAI Trans. Intell. Technol..

[3]  Jun Liu,et al.  A spatial attentive and temporal dilated (SATD) GCN for skeleton-based action recognition , 2021, CAAI Trans. Intell. Technol..

[4]  I. Pustokhina,et al.  Blockchain-based secure data sharing scheme using image steganography and encryption techniques for telemedicine applications , 2022, Wearable Telemedicine Technology for the Healthcare Industry.

[5]  Guohui Wang,et al.  Stud Pose Detection Based on Photometric Stereo and Lightweight YOLOv4 , 2021, Journal of Artificial Intelligence and Technology.

[6]  Bo Li,et al.  UAV maneuvering decision -making algorithm based on Twin Delayed Deep Deterministic Policy Gradient Algorithm , 2021, Journal of Artificial Intelligence and Technology.

[7]  Prem Kumar Singh Data with Non-Euclidean Geometry and its Characterization , 2021, Journal of Artificial Intelligence and Technology.

[8]  N. Ajlouni,et al.  A Novel and Robust Hybrid Blockchain and Steganography Scheme , 2021, Applied Sciences.

[9]  Mohammad R. Khosravi,et al.  An Intelligent Session Key-Based Hybrid Lightweight Image Encryption Algorithm Using Logistic-Tent Map and Crossover Operator for Internet of Multimedia Things , 2021, Wireless Personal Communications.

[10]  Amit Kumar Bairwa,et al.  Dingo Optimizer: A Nature-Inspired Metaheuristic Approach for Engineering Problems , 2021 .

[11]  Dilbag Singh,et al.  Data Clustering Using Moth-Flame Optimization Algorithm , 2021, Sensors.

[12]  Ching-Chun Chang,et al.  Blockchain-Based Reversible Data Hiding for Securing Medical Images , 2021, Journal of healthcare engineering.

[13]  Vipul Mishra,et al.  Two-Way Feature Extraction Using Sequential and Multimodal Approach for Hateful Meme Classification , 2021, Complex..

[14]  K. Manikandan,et al.  Implementation of Least Significant Bit Image Steganography with Advanced Encryption Standard , 2021, 2021 International Conference on Emerging Smart Computing and Informatics (ESCI).

[15]  A. A. Zaidan,et al.  PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture , 2021, Multimedia Tools and Applications.

[16]  Maede Ashouri-Talouki,et al.  Blockchain for steganography: advantages, new algorithms and open challenges , 2021, 2021 18th International ISC Conference on Information Security and Cryptology (ISCISC).

[17]  Ashraf AbdelRaouf,et al.  A new data hiding approach for image steganography based on visual color sensitivity , 2021, Multim. Tools Appl..

[18]  Yuan Liu,et al.  JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image , 2021, EURASIP J. Image Video Process..

[19]  Neha Sharma,et al.  An enhanced Huffman-PSO based image optimization algorithm for image steganography , 2021, Genet. Program. Evolvable Mach..

[20]  Kamlesh Gupta,et al.  Session key based fast, secure and lightweight image encryption algorithm , 2020, Multimedia Tools and Applications.

[21]  Hari Mohan Pandey Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography , 2020, Future Gener. Comput. Syst..

[22]  Joseph Bamidele Awotunde,et al.  A safe and secured iris template using steganography and cryptography , 2020, Multimedia Tools and Applications.

[23]  Bassem Abd-El-Atty,et al.  A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms , 2020, Sensors.

[24]  Adnan Abdul-Aziz Gutub,et al.  Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons , 2020 .

[25]  R. Parvaz,et al.  2D Hybrid chaos map for image security transform based on framelet and cellular automata , 2018, Inf. Sci..

[26]  P. Santhanam,et al.  Effect of Immobilized Nitrifying Bacterial Consortium on Ammonia Biodegradation in Aquaculture Pond and Enhanced Growth of Labeo rohita: An In Vitro and In Vivo Studies , 2020, Arabian Journal for Science and Engineering.

[27]  Guorui Feng,et al.  Broadcasting Steganography in the Blockchain , 2019, IWDW.

[28]  Wassim Alexan,et al.  3D Image Steganography Using Sine Logistic Map and 2D Hyperchaotic Map , 2019, 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA).

[29]  Akbari Indra Basuki,et al.  Joint Transaction-Image Steganography for High Capacity Covert Communication , 2019, 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA).

[30]  Sajjad Shaukat Jamal,et al.  A robust steganographic technique based on improved chaotic-range systems , 2019, Chinese Journal of Physics.

[31]  Priti Maheshwary,et al.  Fast and Secure Medical Image Encryption Based on Non Linear 4D Logistic Map and DNA Sequences (NL4DLM_DNA) , 2019, Journal of Medical Systems.

[32]  R. Logesh,et al.  SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images , 2019, Measurement.

[33]  B. B. Zaidan,et al.  Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard , 2019, Journal of Medical Systems.

[34]  Yasir Ahmed Hamza,et al.  Highly secure image steganography approach using Arnold's Cat map and maximum image entropy , 2019, ICICT '19.

[35]  Peter James Vial,et al.  Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research , 2019, Neurocomputing.

[36]  P. Nithyanandam,et al.  Secured Reversible matrix embedding based on dual image using Integer wavelet and Arnold Transform , 2019, Procedia Computer Science.

[37]  Sumit Kumar Mahana,et al.  Image Steganography: Analysis & Evaluation of Secret Communication , 2019, SSRN Electronic Journal.

[38]  Dharmendra G. Bhatti,et al.  Research Review on Digital Image Steganography Which Resists Against Compression , 2018, Advances in Intelligent Systems and Computing.

[39]  Kapil Sharma,et al.  Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map , 2018, Optik.

[40]  A. K. Pal,et al.  Logistic Map-Based Image Steganography Scheme Using Combined LSB and PVD for Security Enhancement , 2018, Advances in Intelligent Systems and Computing.

[41]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..

[42]  G H Ghazia,et al.  An Enhanced Biometric Information Security System Using Orthogonal Codes and LSB Steganography , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).

[43]  R. Latha,et al.  An Efficient Wavelet Transform Based Steganography Technique Using Chaotic Map , 2018, 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT).

[44]  Awais Ahmad,et al.  An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment , 2018, Soft Comput..

[45]  Mohd Shafry Mohd Rahim,et al.  A review and open issues of multifarious image steganography techniques in spatial domain , 2018 .

[46]  Sambit Bakshi,et al.  A Framework for Pixel Intensity Modulation Based Image Steganography , 2018 .

[47]  R. S. Bichkar,et al.  A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator , 2018 .

[48]  Mohiul Islam,et al.  Neural network based robust image watermarking technique in LWT domain , 2018, J. Intell. Fuzzy Syst..

[49]  José Raymundo Marcial-Romero,et al.  A New Optimization Strategy for Solving the Fall-Off Boundary Value Problem in Pixel-Value Differencing Steganography , 2018, Int. J. Pattern Recognit. Artif. Intell..

[50]  W. Gao,et al.  Sparse recovery based reversible data hiding method using the human visual system , 2018, Multimedia tools and applications.

[51]  Talal Al-Kharobi,et al.  Cryptography and Steganography: New Approach , 2017 .

[52]  Hussain Nyeem,et al.  Reversible data hiding with image bit-plane slicing , 2017, 2017 20th International Conference of Computer and Information Technology (ICCIT).

[53]  Karim Faez,et al.  Adaptive image steganography based on transform domain via genetic algorithm , 2017 .

[54]  Vijay Kumar,et al.  A modified DWT-based image steganography technique , 2017, Multimedia Tools and Applications.

[55]  Peyman Ayubi,et al.  A new transform domain steganography based on modified logistic chaotic map for color images , 2017, J. Inf. Secur. Appl..

[56]  Yazan Aljeroudi,et al.  Extreme learning machine based optimal embedding location finder for image steganography , 2017, PloS one.

[57]  Xing Zhang,et al.  Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting , 2017, IEEE Transactions on Cybernetics.

[58]  Mamta Juneja,et al.  Adaptive Block Based Steganographic Model with Dynamic Block Estimation with Fuzzy Rules , 2017 .

[59]  Manivannan Doraipandian,et al.  Chaotic Map Based Random Image Steganography Using LSB Technique , 2017, Int. J. Netw. Secur..

[60]  Safya Belghith,et al.  A new adaptive image steganography scheme based on DCT and chaotic map , 2017, Multimedia Tools and Applications.

[61]  Khan Muhammad,et al.  CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.

[62]  Ibrahim Kamel,et al.  High-capacity steganography: a global-adaptive-region discrete cosine transform approach , 2017, Multimedia Tools and Applications.

[63]  N. Sasirekha,et al.  High capacity steganography technique based on wavelet transform , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[64]  H. Dadgostar,et al.  Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB , 2016, J. Inf. Secur. Appl..

[65]  A. Annis Fathima,et al.  A cost effective approach for securing medical X-ray images using Chebyshev map , 2016, 2016 International Conference on Recent Trends in Information Technology (ICRTIT).

[66]  Leonardo Palacios-Luengas,et al.  A steganographic method using Bernoulli's chaotic maps , 2016, Comput. Electr. Eng..

[67]  Sengül Dogan,et al.  A new data hiding method based on chaos embedded genetic algorithm for color image , 2016, Artificial Intelligence Review.

[68]  Manashee Kalita,et al.  A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution , 2016, 2016 International Conference on Systems, Signals and Image Processing (IWSSIP).

[69]  Shalini Stalin,et al.  An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing , 2016, Entropy.

[70]  Ahmed Al-Ani,et al.  A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..

[71]  Chung-Yen Su,et al.  Reversible watermarking for medical images using histogram shifting with location map reduction , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).

[72]  Khalid A. Darabkh,et al.  Efficient Reversible Data Hiding Using Multiple Predictors , 2016, Comput. J..

[73]  S. Lenka,et al.  Diagonal queue medical image steganography with Rabin cryptosystem , 2016, Brain Informatics.

[74]  Lih-Chyau Wuu,et al.  High capacity data hiding scheme based on multi-bit encoding function , 2016 .

[75]  Shuliang Sun,et al.  A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..

[76]  Gandharba Swain,et al.  A Steganographic Method Combining LSB Substitution and PVD in a Block , 2016 .

[77]  Mohammad Najmud Doja,et al.  A Novel Edge Based Chaotic Steganography Method Using Neural Network , 2016, FICTA.

[78]  J. Saira Banu,et al.  Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography , 2016, CVIP.

[79]  Somjit Arch-int,et al.  An adaptive multi bit-plane image steganography using block data-hiding , 2016, Multimedia Tools and Applications.

[80]  Nameer N. El-Emam,et al.  A novel algorithm for colour image steganography using a new intelligent technique based on three phases , 2015, Appl. Soft Comput..

[81]  Tao Xiang,et al.  Outsourcing chaotic selective image encryption to the cloud with steganography , 2015, Digit. Signal Process..

[82]  Xiaoxiao Ma,et al.  Reversible data hiding based on local histogram shifting with multilayer embedding , 2015, J. Vis. Commun. Image Represent..

[83]  R. Venkatesan,et al.  A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number , 2015, KSII Trans. Internet Inf. Syst..

[84]  José Raymundo Marcial-Romero,et al.  A Modification of the TPVD Algorithm for Data Embedding , 2015, MCPR.

[85]  Peyman Ayubi,et al.  High secure digital image steganography based on 3D chaotic map , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).

[86]  Mahdi Aziz,et al.  A cycling chaos-based cryptic-free algorithm for image steganography , 2015, Nonlinear Dynamics.

[87]  Li-Hong Huang,et al.  A data hiding scheme using pixel value differencing and improving exploiting modification directions , 2015, Comput. Secur..

[88]  S. Uma Maheswari,et al.  Performance enhanced image steganography systems using transforms and optimization techniques , 2015, Multimedia Tools and Applications.

[89]  Sabah Jassim,et al.  Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping , 2014, SSR.

[90]  Hsien-Wen Tseng,et al.  High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion , 2014, IET Image Process..

[91]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[92]  Suvamoy Changder,et al.  Image realization steganography with LCS based mapping , 2014, 2014 Seventh International Conference on Contemporary Computing (IC3).

[93]  Reza Safabakhsh,et al.  A new steganography method which preserves histogram: Generalization of LSB++ , 2014, Inf. Sci..

[94]  M. C. Adhikary,et al.  Digital Image Data Hiding Techniques: A Comparative Study , 2014, ArXiv.

[95]  Ali Kanso,et al.  A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..

[96]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[97]  Jeanne Chen,et al.  A PVD-based data hiding method with histogram preserving using pixel pair matching , 2014, Signal Process. Image Commun..

[98]  Pye Pye Aung,et al.  A Novel Secure Combination Technique of Steganography and Cryptography , 2014 .

[99]  Mohammad Ali Akhaee,et al.  One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme , 2014, IET Image Process..

[100]  Kousik Dasgupta,et al.  A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO) , 2014, IBICA.

[101]  Hai-Dong Yuan,et al.  Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..

[102]  Xiao Wei Li,et al.  Optical 3D watermark based digital image watermarking for telemedicine , 2013 .

[103]  S. Selvakumar,et al.  High payload image steganography with reduced distortion using octonary pixel pairing scheme , 2013, Multimedia Tools and Applications.

[104]  B. M. Imran,et al.  An efficient steganographic technique based on chaotic maps and adpative PPM embedding , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.

[105]  M. Chandrasekaran,et al.  A novel technique for image steganography using nonlinear chaotic map , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).

[106]  Suvamoy Changder,et al.  Chaos based Edge Adaptive Image Steganography , 2013 .

[107]  Ki-Hyun Jung,et al.  Data hiding using edge detector for scalable images , 2012, Multimedia Tools and Applications.

[108]  Anil K. Jain,et al.  Biometric Authentication: System Security and User Privacy , 2012, Computer.

[109]  Karim Faez,et al.  New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .

[110]  A. Kanso,et al.  Steganographic algorithm based on a chaotic map , 2012 .

[111]  J. Singh,et al.  High Availability of Clouds: Failover Strategies for Cloud Computing Using Integrated Checkpointing Algorithms , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[112]  El-Sayed M. El-Alfy,et al.  Improved pixel value differencing steganography using logistic chaotic maps , 2012, 2012 International Conference on Innovations in Information Technology (IIT).

[113]  Julian Fiérrez,et al.  Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..

[114]  Ahmad Habibizad Navin,et al.  An Optimized Color Image Steganography Using LFSR and DFT Techniques , 2011 .

[115]  G. R. Kanagachidambaresan,et al.  Medical image security using LSB and chaotic logistic map , 2011, ARTCom 2011.

[116]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[117]  Chin-Chen Chang,et al.  Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[118]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[119]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[120]  M. S. Sutaone,et al.  Image based steganography using LSB insertion , 2008 .

[121]  Wm. Arthur Conklin,et al.  Principles of Computer Security , 2007 .

[122]  Jiwu Huang,et al.  Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition , 2007, IEEE Transactions on Image Processing.

[123]  De-shuang Huang,et al.  Computer-Aided Plant Species Identification (CAPSI) Based on Leaf Shape Matching Technique , 2006 .

[124]  Michael R. Lyu,et al.  Nonnegative independent component analysis based on minimizing mutual information technique , 2006, Neurocomputing.

[125]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[126]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[127]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[128]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[129]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[130]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[131]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .