Abstract
With the rapid growth of multimedia technologies, many images are communicated over public channels. Therefore, significant interest has been given to providing secure transmission of images over public channels. Encryption approaches are extensively utilized to secure multimedia data. However, the encrypted images are meaningless, so attackers can easily trace that the corresponding image contains some secret information. To overcome this problem, information hiding approaches such as steganography and watermarking have been introduced. Image steganography is the process of hiding secret contents in a cover image. Thus, the secret contents are hidden in such a way that it is not perceptible to the human eyes. In image steganography, the statistical model of an image is crucial for hiding information in less detectable pixels and attaining better protection. This paper aims to present a systematic review of image steganography approaches. Articles are selected from reputable databases such as IEEE Explore, Web of Science (WOS), ACM, and Willey. We describe the approaches to image steganography in this paper, including their basic concepts, performance parameters, and types. Extensive comparisons are drawn among the existing image steganography approaches to evaluate their advantages and disadvantages over each other. Blockchain based steganography techniques are also evaluated for better stego-medium. A number of future directions are presented that can assist researchers in determining the direction of future research in image steganography.
Similar content being viewed by others
Data Availability
The data collected during the data collection phase are available from the corresponding authors upon request.
References
Mehta DM, Bhatti DG (2019) Research review on digital image steganography which resists against compression. Springer, Singapore, pp 529–534
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32–44
Hussain M et al (2018) Image steganography in spatial domain: a survey. Signal Process 65:46–66
Das S et al (2018) A framework for pixel intensity modulation based image steganography. Progress in advanced computing and intelligent engineering. Springer, Singapore, pp 3–14
Cheddad A et al (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90:727–752
Bi N, Sun Q, Huang D, Yang Z, Huang J (2007) Robust image watermarking based on multiband wavelets and empirical mode decomposition. IEEE Trans Image Process 16(8):1956–1966
Li XW, Kim ST (2013) Optical 3D watermark based digital image watermarking for telemedicine. Opt Lasers Eng 51(12):1310–1320
Forouzan BA, Mukhopadhyay D (2011) Cryptography and network security (Sie). McGraw-Hill Education, New York
Arunkumar S et al (2019) SVD-based robust image steganographic scheme using RIWT and DCT for the secure transmission of medical images. Measurement 139:426–437
Uma Maheswari S, Jude HD (2017) Performance enhanced image steganography systems using transforms and optimization techniques. Multimed Tools Appl 76:415–436
Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy-based scan method and random number. KSII Trans Internet Inf Syst 9(6):2317–2337
Khedmati Y, Parvaz R, Behroo Y (2020) 2D Hybrid chaos map for image security transform based on framelet and cellular automata. Inf Sci 512:855–879
Mahana SK, Aggarwal RK (2019) Image steganography: analysis & evaluation of secret communication. In: Proceedings of international conference on sustainable computing in science, technology and management (SUSCOM), Amity University Rajasthan, Jaipur-India
Jamal SS, Farwa S, Alkhaldi AH, Aslam M et al (2019) A robust steganographic technique based on improved chaotic-range systems. Chin J Phys 61:301–309
Muhammad K et al (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools Appl 76(6):8597–8626
Anees A, Siddiqui AM, Ahmed J, Hussain I (2014) A technique for digital steganography using chaotic maps. Nonlinear Dyn 75(4):807–816
Roya R, Sarkar A, Changer S (2013) Chaos-based edge adaptive image steganography. Proc Technol 10:138–146
Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Procedia Comput Sci 85:39–44
Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on the modified logistic chaotic map for color images. J Inf Secur Appl 34:142–151
Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using LSB technique. Int J Netw Secure 19:593–598
Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19(6):906–910
Torki O, Ashouri-Talouki M, Mahdavi M (2021) Blockchain for steganography: advantages, new algorithms and open challenges. http://arxiv.org/abs/2101.03103
Sutaone MS, Khandare MV (2008) Image-based steganography using LSB insertion. pp 146–151
Khashandarag AS et al (2011) An optimized color image steganography using LFSR and DFT techniques. In: International conference on computer education, simulation and modeling. Springer, Berlin
Savithri G, Mane S, Banu JS (2017) Parallel implementation of RSA 2D-DCT steganography and chaotic 2D-DCT steganography. In: Proceedings of international conference on computer vision and image processing. Springer, Singapore pp 593–605
Yang H, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497
Saidi M et al (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76:13493–13510
Kuo WC, Kuo SH, Wang CC, Wuu LC (2016) High capacity data hiding scheme based on multi-bit encoding function. Optik 127(4):1762–1769
Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77(11):13279–13308
Jain M, Lenka SK (2016) Diagonal queue medical image steganography with Rabin cryptosystem. Brain Inf 3(1):39–51
Wang J et al (2021) JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image. EURASIP J Image Video Process 2021:1–14
Shafi I et al (2018) An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment. Soft Comput 22:1555–1567
Islam M, Roy A, Laskar RH (2018) Neural network-based robust image watermarking technique in LWT domain. J Intell Fuzzy Syst 34:1691–1700
Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76(5):6473–6493
Atee HA et al (2017) Extreme learning machine based optimal embedding location finder for image steganography. PLoS ONE 12:e0170329
Luo T et al (2017) Sparse recovery based reversible data hiding method using the human visual system. Multimed Tools Appl 77:19027–19050
Kaur M, Juneja M (2017) Adaptive block-based steganographic model with dynamic block estimation with fuzzy rules. Innovations in computer science and engineering. Springer, Singapore, pp 167–176
Alam S, Ahmad T, Doja MN (2017) A novel edge based chaotic steganography method using neural network. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications. Springer, Singapore
Dadgostar H, Afsari F (2016) Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. J Inf Secur Appl 30:94–104
Bandyopadhyay D et al (2014) A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO). In: Proceedings of the fifth international conference on innovations in bio-inspired computing and applications IBICA 2014. Springer, Cham
Sarreshtedari S, Akhaee MA (2014) One−third probability embedding: a new ± 1 histogram compensating image Least Significant Bit steganography scheme. IET Image Proc 8:78–89
Sharma N, Batra U (2021) An enhanced Huffman-PSO based image optimization algorithm for image steganography. Genet Program Evol Mach 22(2):189–205
Abdel Raouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl 80(15):23393–23417
Pustokhina IV, Pustokhin DA, Shankar K (2022) Blockchain-based secure data sharing scheme using image steganography and encryption techniques for telemedicine applications. Academic Press, Boca Raton, pp 97–108
Takaoğlu M, Özyavaş A, Ajlouni N, Alsahrani A, Alkasasbeh B (2021) A novel and robust hybrid blockchain and steganography scheme. Appl Sci 11(22):10698
Horng JH, Chang CC, Li GL, Lee WK, Hwang SO (2021) Blockchain-based reversible data hiding for securing medical images. J Healthcare Eng 7:1
Mohsin AH, Zaidan AA, Zaidan BB, Mohammed KI, Albahri OS, Albahri AS, Alsalem MA (2021) PSO-Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture. Multimed Tools Appl 80:14137–14161
Xu M, Wu H, Feng G, Zhang X, Ding F (2019) Broadcasting steganography in the blockchain. Springer, Cham
Basuki AI, Rosiyadi D (2019) Joint transaction-image steganography for high capacity covert communication. In: 2019 international conference on computer, control, informatics and its applications (IC3INA). IEEE
Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst 43:1–17
Singh D, Singh J, Chhabra A (2012) High availability of clouds: failover strategies for cloud computing using integrated checkpointing algorithms. In: 2012 international conference on communication systems and network technologies, pp 698–703
Gupta M, Gupta KK, Shukla PK (2021) Session key based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl 80(7):10391–10416
Zhang X, Wang G (2022) Stud pose detection based on photometric stereo and lightweight YOLOv4. J Artif Intell Technol 2(1):32–37
Aggarwal A, Sharma V, Trivedi A, Yadav M, Agrawal C, Singh D, Mishra V, Gritli H (2021) Two-way feature extraction using sequential and multimodal approach for hateful meme classification. Complexity 2021 2021:5510253. https://doi.org/10.1155/2021/5510253
Singh T, Saxena N, Khurana M, Singh D, Abdalla M, Alshazly H (2021) Data clustering using moth-flame optimization algorithm. Sensors 21(12):4086
Chen R, Dong Pu, Tong Y, Minghu Wu (2022) Image-denoising algorithm based on improved K-singular value decomposition and atom optimization. CAAI Trans Intell Technol 7(1):117–127
Singh PK (2022) Data with non-Euclidean geometry and its characterization. J Artif Intell Technol 2(1):3–8
Yadav K, Yadav M, Saini S (2022) Stock values predictions using deep learning based hybrid models. CAAI Trans Intell Technol 7(1):107–116
Khare A, Shukla PK, Rizvi MA, Stalin S (2016) An intelligent and fast chaotic encryption using digital logic circuits for ad-hoc and ubiquitous computing. Entropy 18:201
Zhang J, Ye G, Tu Z, Qin Y, Qin Q, Zhang J, Liu J (2020) A spatial attentive and temporal dilated (SATD) GCN for skeleton-based action recognition. CAAI Trans Intell Technol 7:46–55. https://doi.org/10.1049/cit2.12012
Bai S, Song S, Liang S, Wang J, Li Bo, Neretin E (2022) UAV maneuvering decision-making algorithm based on twin delayed deep deterministic policy gradient algorithm. J Artif Intell Technol 2(1):16–22
Bairwa AK, Joshi S, Singh D (2021) Dingo optimizer: a nature-inspired metaheuristic approach for engineering problems. Math Probl Eng 2021:2571863. https://doi.org/10.1155/2021/2571863
Gupta M, Gupta KK, Khosravi MR, Shukla PK, Kautish S, Shankar A (2021) An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for internet of multimedia things. Wirel Personal Commun 121:1857–1878
Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: International conference on intelligent computing and applications. Springer, Singapore
Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158–168
Pabbi A, Malhotra R, Manikandan K (2021) Implementation of least significant bit image steganography with advanced encryption standard. In: 2021 international conference on emerging smart computing and informatics (ESCI). IEEE
Xiang T, Jia Hu, Sun J (2015) Outsourcing chaotic selective image encryption to the cloud with steganography. Digit Signal Process 43:28–37
Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898–1907
Roy R, Sarkar A, Changder S (2013) Chaos-based edge adaptive image steganography. Procedia Technol 10(8):138–146
Kanso A, Own HS (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302
Martínez-González RF (2016) A steganographic method using Bernoulli’s chaotic maps. Comput Electr Eng 54:435–449
Kapadia AM, Nithyanandam P (2019) Secured reversible matrix embedding based on the dual image using integer wavelet and arnold transform. Procedia Comput Sci 165:766–773
Thenmozhi S, Chandrasekaran M (2013) A novel technique for image steganography using the nonlinear chaotic map. In: 2013 7th international conference on intelligent systems and control (ISCO). IEEE
Valandar MY, Ayubi P, Barani MJ (2015) High secure digital image steganography based on the 3D chaotic map. In: 2015 7th conference on information and knowledge technology (IKT). IEEE
Latha R, Premkumar R, Anand S (2018) An efficient wavelet transform based steganography technique using chaotic map. In: 2018 international conference on current trends towards converging technologies (ICCTCT). IEEE
Elkandoz MT, Alexan W, Hussein HH (2019) 3D image steganography using sine logistic map and 2D hyperchaotic map. In: 2019 international conference on electrical and computing technologies and applications (ICECTA). IEEE
Bremnavas I, Poorna B, Kanagachidambaresan GR (2011) Medical image security using LSB and chaotic logistic map. pp 229–231
Najeena KS, Imran BM (2013) An efficient steganographic technique based on chaotic maps and adaptive PPM embedding. In: 2013 international conference on signal processing, image processing & pattern recognition. IEEE
Reddy VP, Fathima AA (2016) A cost-effective approach for securing medical X-ray images using Chebyshev map. In: 2016 international conference on recent trends in information technology (ICRTIT). IEEE
El-Alfy ES, Al-Sadi AA (2012) Improved pixel value differencing steganography using logistic chaotic maps. In: 2012 international conference on innovations in information technology (IIT). IEEE
Li X, Yang B, Cheng D, Zeng T (2009) A generalization of LSB matching. IEEE Signal Process Lett 16(2):69–72
Khodaei M, Faez K (2012) New adaptive steganographic method using least significant- bit substitution and pixel-value differencing. IET Image Process 6(6):677–686
Wang J, Ni J, Zhang X, Shi Y-Q (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting’. IEEE Trans Cybern 47(2):315–326
Das S, Sharma S, Bakshi S, Mukherjee I (2018) A framework for pixel intensity modulation based image steganography. Proc Adv Comput Intell Eng 563:3–14. https://doi.org/10.1007/978-981-10-6872-0_1
Aziz M, Tayarani-N MH, Afsar M (2015) A cycling chaos-based cryptic-free algorithm for image steganography. Nonlinear Dyn 80(3):1271–1290
Prasad S, Pal AK (2018) Logistic map based image steganography scheme using combined LSB and PVD for security enhancement. In: Dutta P, Mandal J, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Springer, Singapore
Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Proc Comput Sci 85(85):39–44
Yang T, Wu CW, Chua LO (1997) Cryptography based on chaotic systems. IEEE Trans Circ Syst I 44(5):469–472
Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45:1–14
Hamza YA (2019) Highly secure image steganography approach using Arnold's Cat map and maximum image entropy. In: Proceedings of the international conference on information and communication technology
Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326
Walia GS, Makhija S, Singh K, Sharma K (2018) Robust stego-key directed LSB substitution scheme based upon the cuckoo search and chaotic map. Optik 170:106–124
Martínez-González RF, Díaz-Méndez JA, Palacios-Luengas L, López-Hernández J, Vázquez-Medina R (2016) A steganographic method using Bernoulli’s chaotic maps. Comput Electr Eng 54:435–449
Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26–34
Judge JC (2001) Steganography: past, present, future. SANS white paper 30
Petitcolas FAP, Katzenbeisser s, (2000) Information hiding techniques for steganography and digital watermarking (Artech House Computer Security Series). Artech House, London
Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(1999):1062–1078
Du J-X et al (2006) Computer-aided plant species identification (CAPSI) based on leaf shape matching technique. Trans Inst Meas Control 28(3):275–285
Zheng C-H et al (2006) Nonnegative independent component analysis based on minimizing mutual information technique. Neurocomputing 69:878–883
Mishra M, Mishra P, Adhikary MC (2014) Digital image data hiding techniques: a comparative study. http://arxiv.org/abs/1408.3564
Grajeda-Marín IR, Montes-Venegas HA, Marcial-Romero JR, Hernández-Servín JA, Muñoz-Jiménez V, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. Int J Pattern Recognit Artif Intell 32(01):1860010
Divya V, Sasirekha N (2016) High capacity steganography technique based on wavelet transform. In: 2016 online international conference on green engineering and technologies (IC-GET), IEEE pp 1–5
AL-Shaaby T (2017) Cryptography and steganography: new approach. Trans Netw Commun 5(6):25
Conklin WA, White G, Cothren C, Davis R, Williams D (2015) Principles of computer security. McGraw-Hill Education Group, London
Khanam MS, Verma MJA (2018) Novel and efficient video steganography approach for enhanced security
Devadiga N, Kothari H, Jain H, Sankhe S (2017) E-banking security using cryptography. Steganogr Data Min Int J Comput Appl 164:9
Hashim M, Rahim M, Shafry M, Alwan AA (2018) A review and open issues of multifarious image steganography techniques in spatial domain. J Theor Appl Inf Technol 96:4
Aung PP, Naing TM (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol Model Comput (IJITMC) 2:55–62
Al-Hussain A (2008) Biometric-based authentication security. In: Goel V (ed) That fingerprint sensor on your phone is not as safe as you think. New York Times, New York
Jain K, Nandakumar AK (2012) Biometric authentication: system security and user privacy. Computer 45:87–92
Galbally J, Fierrez J, Alonso-Fernandez F, Martinez-Diaz M (2011) Evaluation of direct attacks to fingerprint verification systems. Telecommun Syst (Springer) 4–3(3–4):243–254
Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494–1498
Abd-El-Atty B, Iliyasu AM, Alaskar H, El-Latif A, Ahmed A (2020) A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 20(11):3108
Pandey HM (2020) Secure medical data transmission using a fusion of bitmask oriented genetic algorithm, encryption, and steganography. Future Gener Comput Syst 111:213–225
Abikoye OC et al (2020) A safe and secured iris template using steganography and cryptography. Multimed Tools Appl 79:1–24
Zainal-Abidin Z et al (2019) Development of iris template protection using LSBRN for biometrics security. IJCSNS Int J Comput Sci Netw Secur 19:7
Ghazi GH, Kaniana G (2018) An enhanced biometric information security system using orthogonal codes and LSB steganography. In: 2018 second international conference on inventive communication and computational technologies (ICICCT), IEEE
Mohsin AH et al (2019) Based medical systems for patient’s authentication: towards a new verification secure framework using CIA standard. J Med Syst 43(7):192
Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using LSB technique. IJ Netw Secur 19(4):593–598
Nyeem H (2017) Reversible data hiding with image bit-plane slicing. In: 2017 20th international conference of computer and information technology (ICCIT), IEEE
Kalita M, Tuithung T (2016) A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution. In: 2016 international conference on systems, signals and image processing (IWSSIP), IEEE
Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90–101
Yuan HD (2014) Secret sharing with multi−cover adaptive steganography. Inf Sci 254:197–212
Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia Tools Appl 73:2223–2245
Hernández-Servin JA, Marcial-Romero JR, Jiménez VM, Montes-Venegas HA (2015) A modification of the TPVD algorithm for data embedding. Springer, New York
Chen J (2014) A PVD−based data hiding method with histogram preserving using pixel pair matching. Signal Process 29:375–384
Jafar IF, Darabkh KA, Al-Zubi RT, Al Namneh RA (2016) Efficient reversible data hiding using multiple predictors. Comput J 59(3):423–438
Pan Z, Hu S, Ma X, Wang L (2015) Reversible data hiding based on local histogram shifting with multilayer embedding. J Vis Commun Image Represent 31:64–74
Chen NK, Su CY, Shih CY, Chen YT (2016) Reversible watermarking for medical images using histogram shifting with location map reduction. In: 2016 IEEE international conference on industrial technology (ICIT). pp 792–797
Tseng HW, Leng HS (2014) High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Proc 8:647–654
Jung KH, Yoo KY (2014) Data hiding using edge detector for scalable images. Multimedia Tools Appl 71:1455–1468
Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306
Sun S (2016) A novel edge-based image steganography with 2 k correction and Huffman encoding. Inf Process Lett 116:93–99
Roy R, Changder S (2014) Image realization steganography with LCS based mapping. In: 2014 seventh international conference on contemporary computing (IC3), IEEE, pp 218−223
Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping. In: International conference on research in security standardisation, Springer, pp 151−166
Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41:6123–6130
El-Emam NN, Al-Diabat M (2015) A novel algorithm for color image steganography using a new intelligent technique based on three phases. Appl Soft Comput 37:830–846
Doğan Ş (2016) A new data hiding method based on chaos embedded genetic algorithm for a color image. Artif Intell Rev 46:129–143
Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131–141
Nguyen TD, Arch-int S, Arch-int N (2016) An adaptive multi-bit-plane image steganography using block data-hiding. Multimed Tools Appl 75:8319–8345
Funding
This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.2021-0-00118, Development of decentralized consensus composition technology for large-scale nodes) and This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2021-0-01835) supervised by the IITP (Institute of Information & Communications Technology Planning & Evaluation).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors would like to confirm there are no conflicts of interest regarding the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kaur, S., Singh, S., Kaur, M. et al. A Systematic Review of Computational Image Steganography Approaches. Arch Computat Methods Eng 29, 4775–4797 (2022). https://doi.org/10.1007/s11831-022-09749-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11831-022-09749-0