Cite

1. Desoky, A. Noiseless Steganography. CRC Press, 2012. Search in Google Scholar

2. Abd El-Latif, A. A., B. Abd El-Att, S. E. Venegas-Andraca. A Novel Image Steganography Technique Based on Quantum Substitution Boxes. – Optics and Laser Technology, Vol. 116, 2019, pp. 92-102.10.1016/j.optlastec.2019.03.005 Search in Google Scholar

3. Al-Afandy, K. A., O. S. Faragallah, A. Elmhalawy, E. S. M. El-Rabaie, G. M. El-Banby. High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography. – In: 4th International Colloquium on Information Science and Technology (CIST’16), IEEE, 2016, pp. 400-404.10.1109/CIST.2016.7805079 Search in Google Scholar

4. Kumar, V., D. Kumar. Digital Image Steganography Based on Combination of DCT and DWT. – Communications in Computer and Information Science, Vol. 101, 2010, pp. 596-601.10.1007/978-3-642-15766-0_102 Search in Google Scholar

5. Kumar, S. K., P. D. K. Reddy, G. Ramesh, V. R. Maddumla. Image Transformation Technique Using Steganography Methods Using LWT Technique. – International Information and Engineering Technology Assocation, Vol. 36, 2019, No 3, pp. 233-237.10.18280/ts.360305 Search in Google Scholar

6. Juarez-Sandoval, O., M. Cedillo-Hernandez, G. Sanchez-Perez, K. Toscano-Medina, H. Perez-Meana, M. Nakano-Miyatake. Compact Image Steganalysis for LSB-Matching Steganography. – In: Proc. of 5th International Workshop on Biometrics and Forensics, IWBF, 2017.10.1109/IWBF.2017.7935103 Search in Google Scholar

7. Kadhim, I. J., P. Premaratne, P. J. Vial, B. Halloran. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. – Neurocomputing, Vol. 335, 2019, pp. 299-326.10.1016/j.neucom.2018.06.075 Search in Google Scholar

8. Mishra, M., P. Mishra, M. C. Adhikary. Digital Image Data Hiding Techniques: A Comparative Study. – Ansvesa, Vol. 7, 2014, No 2, pp. 105-115. Search in Google Scholar

9. Mishra, B., R. Beg, V. P. Singh. Information Security through Digital Image Steganography Using Multilevel and Compression Technique. – MIT International Journal of Computer Science & Information Technology, Vol. 3, 2013, No 1, pp. 26-29. Search in Google Scholar

10. Hu, D., L. Wang, W. Jiang, S. Zheng, B. Li. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks. – IEEE Transactions on Information Forensics and Security, Vol. 6, 2018, pp. 38303-38314.10.1109/ACCESS.2018.2852771 Search in Google Scholar

11. Singh, S., R. Beg, T. J. Siddiqui. Robust Image Steganography Using Complex Wavelet Transform. – In: Proc. of International Multimedia, Signal Processing and Communication Technologies, IMPACT, 2013, pp. 56-30.10.1109/MSPCT.2013.6782087 Search in Google Scholar

12. Hussain, M., A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, T. S. Jung. Image Steganography in Spatial Domain: A Survey. – Signal Processing: Image Communication Vol. 65, 2018, pp. 46-66. Search in Google Scholar

13. Zhou, Z., Y. Mu, Q. M. J. Wu. Coverless Image Steganography Using Partial-Duplicate Image Retrieval. – Soft Computing, Vol. 23, 2019, No 23, pp. 4927-4938.10.1007/s00500-018-3151-8 Search in Google Scholar

14. Darwis, D., A. Junaidi, Wamiliana. A New Approach of Steganography Using Center Sequential Technique. – In: Journal of Physics: Conference Series. Vol. 1338. 2019.10.1088/1742-6596/1338/1/012063 Search in Google Scholar

15. Juarez-Sandoval, O., A. Fierro-Radilla, A. Espejel-Trujillo, M. Nakano-Miyatake, H. Perez-Meana. Cropping and Noise Resilient Steganography Algorithm Using Secret Image Sharing. – In: Proc. of 6th International Conference on Graphic and Image Processing (ICGIP’14), Vol. 9443, 2015.10.1117/12.2179745 Search in Google Scholar

16. Akar, F., Y. Yalman, H. S. Varol. Data Hiding in Digital Images Using a Partial Optimization Technique Based on the Classical LSB Method. – Turkish Journal of Electrical Engineering and Computer Sciences, Vol. 21, 2013, pp. 2037-2047.10.3906/elk-1205-58 Search in Google Scholar

17. Setiadi, D. R. I. M., J. Jumanto. An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 74-88.10.2478/cait-2018-0029 Search in Google Scholar

18. Swain, G., S. K. Lenka. A Novel Steganography Technique by Mapping Words with LSB Array. – International Journal of Signal and Imaging Systems Engineering, Vol. 8, 2015, No 1-2, pp. 115-122.10.1504/IJSISE.2015.067052 Search in Google Scholar

19. Alhumyani, H. Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform. – Cybernetics and Information Technologies, Vol. 20, 2020, No 1, pp. 68-81.10.2478/cait-2020-0005 Search in Google Scholar

20. Wamiliana, M. Usman, A. Hijriani, Warsito, R. Setiawan. The Hybrid Methods of Column Transposition with Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) Using File jpg/jpeg and png. – International Journal of Computer Science and Network Security, Vol. 17, 2017, No 7, pp. 174-179. Search in Google Scholar

21. Zhang, Y., C. Qin, W. Zhang, F. Liu, X. Luo. On the Fault-Tolerant Performance for a Class of Robust Image Steganography. – Signal Processing, Vol. 146, 2018, pp. 99-111.10.1016/j.sigpro.2018.01.011 Search in Google Scholar

22. Zhang, X., F. Peng, M. Long. Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. – IEEE Transactions on Multimedia. Vol. 20, 2018, No 12, pp. 3223-3238.10.1109/TMM.2018.2838334 Search in Google Scholar

23. Wu, P., Y. Yang, X. Li. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network. – Future Internet, Vol. 10, 2018, pp. 1-15.10.3390/fi10060054 Search in Google Scholar

24. Sahu, A. K., G. Swain, E. S. Babu. Digital Image Steganography Using Bit Flipping. – Cybernetics and Information Technologies, Vol. 18, 2018, No 1, pp. 69-80.10.2478/cait-2018-0006 Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology