Page 58 - 2024-Vol20-Issue2
P. 58

54 |                                                                         Alobaidi & Mikhael

               (a) (a)

      (b) (c) (d)                                                   (b) (c) (d)

      (e) (f)      (g)

                                                                    (e) (f)      (g)

 Fig. 6. Samples from BOSSBase database/spatial LSB. (a)            Fig. 7. Samples from BOSSBase database/DCT Blocks. (a)
Original cover image, (b) Stegoimage with block size of 4, (c)      Original cover image, (b) Stegoimage with block size of 4, (c)
Stegoimage with block size of 8, (d) Stegoimage with block          Stegoimage with block size of 8, (d) Stegoimage with block

     size of 16, (e) Stegoimage with block size of 32, (f)               size of 16, (e) Stegoimage with block size of 32, (f)
Stegoimage with block size of 64, (g) Stegoimage block size         Stegoimage with block size of 64, (g) Stegoimage block size

                                of 128.                                                             of 128.

technique in terms of RMSE, SSIM, PSNR, and visual quality.         [4] Y. Liu, S. Liu, Y. Wang, H. Zhao, and S. Liu, “Video
In addition, the histogram of the stegoimages rendered by                steganography: A review,” Neurocomputing, vol. 335,
the proposed technique was not altered which indicate the                pp. 238–250, 2019.
immunity against attacks.
                                                                    [5] S. Dhawan and R. Gupta, “Analysis of various data se-
              CONFLICT OF INTEREST                                       curity techniques of steganography: A survey,” Infor-
                                                                         mation Security Journal: A Global Perspective, vol. 30,
The authors have no conflict of relevant interest to this article.       no. 2, pp. 63–87, 2021.

                     REFERENCES                                     [6] J. Fridrich and M. Goljan, “Practical steganalysis of dig-
                                                                         ital images: state of the art,” security and Watermarking
 [1] P. C. Mandal, I. Mukherjee, G. Paul, and B. Chatterji,              of Multimedia Contents IV, vol. 4675, pp. 1–13, 2002.
      “Digital image steganography: A literature survey,” In-
      formation sciences, 2022.                                     [7] R. Sonar and G. Swain, “Steganography based on quo-
                                                                         tient value differencing and pixel value correlation,”
 [2] A. A. AlSabhany, A. H. Ali, F. Ridzuan, A. Azni, and               CAAI Transactions on Intelligence Technology, vol. 6,
      M. R. Mokhtar, “Digital audio steganography: System-               no. 4, pp. 504–519, 2021.
      atic review, classification, and analysis of the current
      state of the art,” Computer Science Review, vol. 38,          [8] J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble clas-
      p. 100316, 2020.                                                   sifiers for steganalysis of digital media,” IEEE Transac-
                                                                         tions on information forensics and security, vol. 7, no. 2,
 [3] M. A. Majeed, R. Sulaiman, Z. Shukur, and M. K. Hasan,              pp. 432–444, 2011.
      “A review on text steganography techniques,” Mathemat-
      ics, vol. 9, no. 21, p. 2829, 2021.                           [9] J. Davidson, C. Bergman, and E. Bartlett, “An artificial
                                                                         neural network for wavelet steganalysis,” in Mathemati-
   53   54   55   56   57   58   59   60   61   62   63