2022
DOI: 10.1007/s11831-022-09749-0
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Review of Computational Image Steganography Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 111 publications
0
10
0
2
Order By: Relevance
“…Apart from the frequency distribution, another additional piece of data extracted was the proportionate occurrence of every letter with respect to Q (the least frequent letter) as elucidated in figure [12].…”
Section: Extraction Of Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…Apart from the frequency distribution, another additional piece of data extracted was the proportionate occurrence of every letter with respect to Q (the least frequent letter) as elucidated in figure [12].…”
Section: Extraction Of Datasetmentioning
confidence: 99%
“…SSIM Figure 34: L2RAT values for all the images included in this disquisitionMean: Mean value for both the CI and SI is compared in this part for the steganalysis of the proposed procedure. Mean values for all the images used in this disquisition are depicted in table[12] and figure[35] …”
mentioning
confidence: 99%
“…Furthermore, image steganography uses image as cover object and inserts the secret information using different reported methods such as spatial domain, frequency domains etc. The extensive surveys of the image steganography are presented in [10][11][12][13][14]. Every existing method has their advantages and disadvantages in terms of payload, security, perception, temper protection, and computation which are the basic criteria of steganography as well as the basic needs for any steganographic methods shown in Fig.…”
Section: Intrucductionmentioning
confidence: 99%
“…When comparing the proposed system results with existing methods, the results were convincing as shown in Table 1. The previous methods depend on one principle, which is the embedding in the places of the LSB, which is a rather easy to predict method, as in [43]. Many traditional methods take care of increasing security and this is at the expense of the amount of data embedded because a single pixel can accommodate a specified number of bits to maintain the imperceptibility of the image [44].…”
Section: Related Studymentioning
confidence: 99%