ISSN: 2252-8938
Int J Artif Intell, Vol. 14, No. 3, June 2025: 2210-2219
2218
[6] R. Kumar and A. Malik, “Multimedia information hiding method for AMBTC compressed images using LSB substitution
technique,” Multimedia Tools and Applications, vol. 82, no. 6, pp. 8623–8642, Mar. 2023, doi: 10.1007/s11042-022-14221-z.
[7] A. K. Sahu and G. Swain, “Reversible image steganography using dual-layer LSB matching,” Sensing and Imaging, vol. 21,
no. 1, Dec. 2020, doi: 10.1007/s11220-019-0262-y.
[8] S. Arivazhagan, W. S. L. Jebarani, S. T. Veena, and E. Amrutha, “Extraction of secrets from LSB stego images using various
denoising methods,” International Journal of Information Technology, vol. 15, no. 4, pp. 2107–2121, Apr. 2023, doi:
10.1007/s41870-023-01265-z.
[9] O. P. Singh, K. N. Singh, N. Baranwal, A. K. Agrawal, A. K. Singh, and H. Zhou, “HIDEmarks: hiding multiple marks for robust
medical data sharing using IWT-LSB,” Multimedia Tools and Applications, vol. 83, no. 8, pp. 24919–24937, Aug. 2023, doi:
10.1007/s11042-023-16446-y.
[10] P. Naveen and R. Jayaraghavi, “Image steganography method for securing multiple images using LSB–GA,” Wireless Personal
Communications, vol. 135, no. 1, pp. 1–19, Mar. 2024, doi: 10.1007/s11277-024-10945-3.
[11] P. N. Andono and D. R. I. M. Setiadi, “Quantization selection based on characteristic of cover image for PVD Steganography to
optimize imperceptibility and capacity,” Multimedia Tools and Applications, vol. 82, no. 3, pp. 3561–3580, Jan. 2023, doi:
10.1007/s11042-022-13393-y.
[12] W.-B. Lin, T.-H. Lai, and K.-C. Chang, “Statistical feature-based steganalysis for pixel-value differencing steganography,”
EURASIP Journal on Advances in Signal Processing, vol. 2021, no. 1, Dec. 2021, doi: 10.1186/s13634-021-00797-5.
[13] G. Paul, S. K. Saha, and D. Burman, “A PVD based high capacity steganography algorithm with embedding in non-sequential
position,” Multimedia Tools and Applications, vol. 79, no. 19–20, pp. 13449–13479, May 2020, doi: 10.1007/s11042-019-08178-9.
[14] A. O. Modupe, A. E. Adedoyin, and A. O. Titilayo, “A comparative analysis of LSB, MSB and PVD based image
steganography,” International Journal of Research and Review, vol. 8, no. 9, pp. 373–377, Sep. 2021, doi:
10.52403/ijrr.20210948.
[15] R. Kaur and B. Singh, “A robust and imperceptible n-ary based image steganography in DCT domain for secure communication,”
Multimedia Tools and Applications, vol. 83, no. 7, pp. 20357–20386, Aug. 2023, doi: 10.1007/s11042-023-16330-9.
[16] M. Baziyad, T. Rabie, I. Kamel, and M. Benkhelifa, “Polynomial fitting: enhancing the stego quality of DCT-based
steganography schemes,” Multimedia Tools and Applications, vol. 81, no. 30, pp. 43999–44019, Dec. 2022, doi: 10.1007/s11042-
022-13004-w.
[17] X. Song, C. Yang, K. Han, and S. Ding, “Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform
domain,” Multimedia Tools and Applications, vol. 81, no. 25, pp. 36453–36472, Oct. 2022, doi: 10.1007/s11042-022-13525-4.
[18] R. Patel, K. Lad, M. Patel, and M. Desai, “An efficient DCT-SBPM based video steganography in compressed domain,”
International Journal of Information Technology, vol. 13, no. 3, pp. 1073–1078, Jun. 2021, doi: 10.1007/s41870-021-00648-4.
[19] D. Baby, J. Thomas, G. Augustine, E. George, and N. R. Michael, “A novel DWT based image securing method using
steganography,” Procedia Computer Science, vol. 46, pp. 612–618, 2015, doi: 10.1016/j.procs.2015.02.105.
[20] A. Y. Darani, Y. K. Yengejeh, G. Navarro, H. Pakmanesh, and J. Sharafi, “Optimal location using genetic algorithms for chaotic
image steganography technique based on discrete framelet transform,” Digital Signal Processing, vol. 144, Jan. 2024, doi:
10.1016/j.dsp.2023.104228.
[21] A. Martín, A. Hernández, M. Alazab, J. Jung, and D. Camacho, “Evolving generative adversarial networks to improve image
steganography,” Expert Systems with Applications, vol. 222, Jul. 2023, doi: 10.1016/j.eswa.2023.119841.
[22] S. Baluja, “Hiding images in plain sight: deep steganography,” Advances in neural information processing systems, vol. 30, 2017,
pp: 2066–2076.
[23] S. Baluja, “Hiding images within images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42, no. 7,
pp. 1685–1697, Jul. 2020, doi: 10.1109/TPAMI.2019.2901877.
[24] K. Sharma, A. Aggarwal, T. Singhania, D. Gupta, and A. Khanna, “Hiding data in images using cryptography and deep neural
network,” Journal of Artificial Intelligence and Systems, vol. 1, no. 1, pp. 143–162, 2019, doi: 10.33969/ais.2019.11009.
[25] D. R. I. M. Setiadi, S. Rustad, P. N. Andono, and G. F. Shidik, “Digital image steganography survey and investigation (goal,
assessment, method, development, and dataset),” Signal Processing, vol. 206, 2023, doi: 10.1016/j.sigpro.2022.108908.
[26] P. Yadav and S. Dhall, “Comparative analysis of steganography technique for information security,” International Journal of
Mathematical Sciences and Computing, vol. 6, no. 4, pp. 42–69, 2020, doi: 10.5815/ijmsc.2020.04.05.
[27] V. Himthani, V. S. Dhaka, M. Kaur, G. Rani, M. Oza, and H.-N. Lee, “Comparative performance assessment of deep learning
based image steganography techniques,” Scientific Reports, vol. 12, no. 1, Oct. 2022, doi: 10.1038/s41598-022-17362-1.
[28] D. R. I. M. Setiadi, “PSNR vs SSIM: imperceptibility quality assessment for image steganography,” Multimedia Tools and
Applications, vol. 80, no. 6, pp. 8423–8444, Mar. 2021, doi: 10.1007/s11042-020-10035-z.
BIOGRAPHIES OF AUTHORS
Mohamed Htiti received the B.Sc. degree in nuclear physics from Sidi
Mohamed Ben Abdallah University, in 2002. Received the M.Sc. degree in physics and
nuclear techniques from Cadi Ayyad University, in 2005. Received the B.Sc. degree in IT
Engineering from Faculty of Taza Polydiscipline, University of Sidi Mohamed Ben Abdellah,
in 2020. Received a specialized master's degree in intelligent and mobile systems from the
Faculty of Taza Polydiscipline, Morocco, in 2023. Now he is a Ph.D. student registered in the
LSI Laboratory of Engineer Sciences of the Faculty of Taza Polydiscipline, University of Sidi
Mohamed Ben Abdellah, Fez, Morocco. His research interests include cryptography,
steganography, deep learning, and image processing. He can be contacted at email:
[email protected].