Page 58 - 2024-Vol20-Issue2
P. 58
54 | Alobaidi & Mikhael
(a) (a)
(b) (c) (d) (b) (c) (d)
(e) (f) (g)
(e) (f) (g)
Fig. 6. Samples from BOSSBase database/spatial LSB. (a) Fig. 7. Samples from BOSSBase database/DCT Blocks. (a)
Original cover image, (b) Stegoimage with block size of 4, (c) Original cover image, (b) Stegoimage with block size of 4, (c)
Stegoimage with block size of 8, (d) Stegoimage with block Stegoimage with block size of 8, (d) Stegoimage with block
size of 16, (e) Stegoimage with block size of 32, (f) size of 16, (e) Stegoimage with block size of 32, (f)
Stegoimage with block size of 64, (g) Stegoimage block size Stegoimage with block size of 64, (g) Stegoimage block size
of 128. of 128.
technique in terms of RMSE, SSIM, PSNR, and visual quality. [4] Y. Liu, S. Liu, Y. Wang, H. Zhao, and S. Liu, “Video
In addition, the histogram of the stegoimages rendered by steganography: A review,” Neurocomputing, vol. 335,
the proposed technique was not altered which indicate the pp. 238–250, 2019.
immunity against attacks.
[5] S. Dhawan and R. Gupta, “Analysis of various data se-
CONFLICT OF INTEREST curity techniques of steganography: A survey,” Infor-
mation Security Journal: A Global Perspective, vol. 30,
The authors have no conflict of relevant interest to this article. no. 2, pp. 63–87, 2021.
REFERENCES [6] J. Fridrich and M. Goljan, “Practical steganalysis of dig-
ital images: state of the art,” security and Watermarking
[1] P. C. Mandal, I. Mukherjee, G. Paul, and B. Chatterji, of Multimedia Contents IV, vol. 4675, pp. 1–13, 2002.
“Digital image steganography: A literature survey,” In-
formation sciences, 2022. [7] R. Sonar and G. Swain, “Steganography based on quo-
tient value differencing and pixel value correlation,”
[2] A. A. AlSabhany, A. H. Ali, F. Ridzuan, A. Azni, and CAAI Transactions on Intelligence Technology, vol. 6,
M. R. Mokhtar, “Digital audio steganography: System- no. 4, pp. 504–519, 2021.
atic review, classification, and analysis of the current
state of the art,” Computer Science Review, vol. 38, [8] J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble clas-
p. 100316, 2020. sifiers for steganalysis of digital media,” IEEE Transac-
tions on information forensics and security, vol. 7, no. 2,
[3] M. A. Majeed, R. Sulaiman, Z. Shukur, and M. K. Hasan, pp. 432–444, 2011.
“A review on text steganography techniques,” Mathemat-
ics, vol. 9, no. 21, p. 2829, 2021. [9] J. Davidson, C. Bergman, and E. Bartlett, “An artificial
neural network for wavelet steganalysis,” in Mathemati-