A Survey on Steganography and Image Encryption Techniques

Authors

  • Noor D. Majeed Electrical Engineering Technical College, Middle Technical University, Baghdad, Iraq
  • Ali J. Al-Askery School of Engineering, Newcastle University, Newcastle, UK
  • Fadhil Sahib Hasan College of Engineering, Mustansiriyah University, Baghdad, Iraq
  • Samir Abood Electrical and Computer Engineering Department, Prairie View A&M University, Texas, USA

DOI:

https://doi.org/10.51173/eetj.v2i1.13

Keywords:

Security, Encryption image, Steganography, Development and challenges, Evaluation parameters

Abstract

Modern Internet technologies have led to an increase in the transmission and receiving of information across the network, especially images that may contain confidential information, so it has become necessary to increase protection for these images. The processes of protecting information during the transmission are scientifically divided into encryption and hiding techniques. Encryption techniques change the secret data content to become unclear for professional hackers. On the contrary, steganography saves the same content of secret data but inserts it in the medium cover without clearly showing any change in the medium. These covers, such as text, images, or video, whereas images and video are more efficient than other covers because they have powerful and complex structures to achieve more security. The combination of hybrid encryption and steganography gives more multi-leveled security protection, which is hardly predictable against intruders. This work analyzes the challenges that may face researchers in this field, in addition to discussing the latest technologies proposed. Besides that, the evaluation parameters of these techniques are summarized.

References

X. Wang, X. Wang, B. Ma, Q. Li, and Y.-Q. Shi, “High precision error prediction algorithm based on ridge regression predictor for reversible data hiding,” IEEE Signal Process. Lett., vol. 28, pp. 1125–1129, 2021. DOI:10.1109/LSP.2021.3080181

M. Kaur and V. Kumar, “A comprehensive review on image encryption techniques,” Arch. Comput. Methods Eng., vol. 27, no. 1, pp. 15–43, 2020. DOI:10.1007/s11831-018-9298-8

K. C. Jithin and S. Sankar, “Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set,” J. Inf. Secur. Appl., vol. 50, no. 102428, p. 102428, 2020. DOI:10.1016/j.jisa.2019.102428

R. B. Naik and U. Singh, “A review on applications of chaotic maps in pseudo-random number generators and encryption,” Ann. Data Sci., vol. 11, no. 1, pp. 25–50, 2024. DOI:10.1007/s40745-021-00364-7

J. S. Muthu and P. Murali, “Review of chaos detection techniques performed on chaotic maps and systems in image encryption,” SN Comput. Sci., vol. 2, no. 5, 2021. DOI: 10.1007/s42979-021-00778-3

M. Z. Talhaoui, X. Wang, and M. A. Midoun, “A new one-dimensional cosine polynomial chaotic map and its use in image encryption,” Vis. Comput., vol. 37, no. 3, pp. 541–551, 2021.DOI: 10.1007/s00371-020-01822-8

X. Wang, S. Gao, L. Yu, Y. Sun, and H. Sun, “Chaotic image encryption algorithm based on bit-combination scrambling in decimal system and dynamic diffusion,” IEEE Access, vol. 7, pp. 103662–103677, 2019. DOI: 10.1109/ACCESS.2019.2931052

K. J. Sher and J. Ahmad, “Chaos-based efficient selective image encryption,” Multidimensional Systems and Signal Processing, vol. 30, pp. 943–961, 2019. DOI:10.1007/s11045-018-0589-x

Z.-H. Gan, X.-L. Chai, D.-J. Han, and Y.-R. Chen, “A chaotic image encryption algorithm based on 3-D bit-plane permutation,” Neural Comput. Appl., vol. 31, no. 11, pp. 7111–7130, 2019. DOI:10.1007/s00521-018-3541-y

A. Alireza, M. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” The Journal of Supercomputing, vol. 75, pp. 6663–6682, 2019. DOI: 10.1007/s11227-019-02878-7

F. S. Hasan and M. A. Saffo, “FPGA hardware co-simulation of image encryption using stream cipher based on chaotic maps,” Sens. Imaging, vol. 21, no. 1, 2020. DOI:10.1007/s11220-020-00301-7

L. Tao, D. Baoxiang, and X. Liang, “Image encryption algorithm based on logistic and two-dimensional Lorenz,” Ieee Access, vol. 8, pp. 13792–13805, 2020. DOI: 10.1109/ACCESS.2020.2966264

G. Kaur, R. Agarwal, and V. Patidar, “Chaos based multiple order optical transform for 2D image encryption,” Eng. Sci. Technol. Int. J., vol. 23, no. 5, pp. 998–1014, 2020. DOI: 10.1016/j.jestch.2020.02.007

X. Gao, “Image encryption algorithm based on 2D hyperchaotic map,” Opt. Laser Technol., vol. 142, no. 107252, p. 107252, 2021.DOI: 10.1016/j.optlastec.2021.107252

H. Wen, Z. Chen, J. Zheng,Y. Huang, S. Li, L. Ma, Y. Lin, Z. Liu, R. Li, L. Liu, W. Lin, J. Yang, C. Zhang, H.Yang, “Design and embedded implementation of secure image encryption scheme using DWT and 2D-LASM,” Entropy (Basel), vol. 24, no. 10, p. 1332, 2022.DOI: 10.3390/e24101332

Q. Lai and Y. Liu, “A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map,” Expert Syst. Appl., vol. 223, no. 119923, p. 119923, 2023.DOI: 10.1016/j.eswa.2023.119923

H. Wen, Y. Huang, and Y. Lin, “High-quality color image compression-encryption using chaos and block permutation,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 8, p. 101660, 2023.DOI: 10.1016/j.jksuci.2023.101660

D. A. Q. Shakir, A. Salim, S. Q. A. Al-Rahman, and A. M. Sagheer, “Image encryption using Lorenz chaotic system,” Journal of Techniques, vol. 5, no. 1, pp. 122–128, 2023.DOI: 10.51173/jt.v5i1.840

A. Toktas, “A robust bit-level image encryption based on Bessel map,” Applied Mathematics and Computation, vol. 462, 2024.DOI: 10.1016/j.amc.2023.128340

S. Patel, V. Thanikaiselvan, and A. Rearajan, “Secured quantum image communication using new two dimensional chaotic map based encryption methods,” Int. J. Theor. Phys., vol. 63, no. 2, 2024.DOI: 10.1007/s10773-024-05548-4

D. Lambić, “A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design,” Nonlinear Dyn., vol. 100, no. 1, pp. 699–711, 2020.DOI: 10.1007/s11071-020-05503-y

C. Easttom, “s-box Design,” in Modern Cryptography, Cham: Springer International Publishing, 2022, pp. 193–212.DOI:10.1007/978-3-031-12304-7_8

K. M. Fahad, A. Ahmed, and K. Saleem, “A novel cryptographic substitution box design using Gaussian distribution,” IEEE Access, vol. 7, pp. 15999–16007, 2019. DOI: 10.1109/ACCESS.2019.2893176

L. Lidong, D. Jiang, X. Wang, L. Zhang, and X. Rong, “A dynamic triple-image encryption scheme based on chaos, S-box and image compressing,” IEEE Access, vol. 8, pp. 210382–210399, 2020. DOI: 10.1109/ACCESS.2020.3039891

Q. Lu, C. Zhu, and X. Deng, “An efficient image encryption scheme based on the LSS chaotic map and single S-box,” IEEE Access, vol. 8, pp. 25664–25678, 2020. DOI: 10.1109/ACCESS.2020.2970806

S. Ibrahim and A. Alharbi, “Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography,” IEEE Access, vol. 8, pp. 194289–194302, 2020.DOI: 10.1109/ACCESS.2020.3032403

M. Z. Talhaoui and X. Wang, “A new fractional one dimensional chaotic map and its application in high-speed image encryption,” Inf. Sci. (Ny), vol. 550, pp. 13–26, 2021.DOI: 10.1016/j.ins.2020.10.048

T. Sajjad and R. Ali, “A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box,” Multimedia Tools and Applications, vol. 81, pp. 20585–20609, 2022.DOI: 10.1007/s11042-022-12268-6

Arif et al., “A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution,” IEEE Access, vol. 10, pp. 12966–12982, 2022.DOI: 10.1109/ACCESS.2022.3146792

R. S. Ali and O. Z. Akif, S. A. Jassim, Farhan, A. K. Farhan, E. S. El-Kenawy, A. Ibrahim, M. E. Ghoneim, A. Abdelhamid, “Enhancement of the CAST block algorithm based on novel S-Box for image encryption,” Sensors (Basel), vol. 22, no. 21, p. 8527, 2022.DOI: 10.3390/s22218527

E.-S. El Akkad L. Khrissi K. Satori W. El-Shafai T. Altameem R. S. Rathore, “An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers,” Egypt. Inform. J., vol. 25, no. 100449, p. 100449, 2024.DOI: 10.1016/j.eij.2024.100449

S. Ibrahim, A. M. Abbas, A. A. Alharbi, and M. A. Albahar, “A new 12-bit chaotic image encryption scheme using a 12 × 12 dynamic S-box,” IEEE Access, vol. 12, pp. 37631–37642, 2024. 10.1109/ACCESS.2024.3374218

D. Ustun, S. Sahinkaya, and N. Atli, “Developing a secure image encryption technique using a novel S-box constructed through real-coded genetic algorithms crossover and mutation operators,” Expert Systems with Applications, 2024.DOI 10.1016/j.eswa.2024.124904:

T.-Y. Wu, X. Fan, K.-H. Wang, C.-F. Lai, N. Xiong, and J. M.-T. Wu, “A DNA computation-based image encryption scheme for cloud CCTV systems,” IEEE Access, vol. 7, pp. 181434–181443, 2019. DOI: 10.1109/ACCESS.2019.2946890

E. Z. Zefreh, “An image encryption scheme based on a hybrid model of DNA computing, chaotic systems, and hash functions,” in Multimedia Tools and Applications 79, 2020, pp. 24993–25022.DOI: 10.1007/s11042-020-09111-1

N. Iqbal et al., “On the image encryption algorithm based on the chaotic system, DNA encoding, and castle,” IEEE Access, vol. 9, pp. 118253–118270, 2021. DOI: 10.1109/ACCESS.2021.3106028

P. N. Lone, D. Singh, and U. H. Mir, “Image encryption using DNA coding and three-dimensional chaotic systems,” Multimed. Tools Appl., vol. 81, no. 4, pp. 5669–5693, 2022. DOI:10.1007/s11042-021-11802-2

B. Jasara and A. H. Moon, “Color image encryption and authentication using dynamic DNA encoding and hyperchaotic system,” Expert Systems with Applications, vol. 206, 2022.DOI: 10.1016/j.eswa.2022.117861

A. Alrubaie, a. A. A. Maisa, and A. T. Khodher, “Image encryption based on 2DNA encoding and chaotic 2D logistic map,” Journal of Engineering and Applied Science, vol. 70, 2023. DOI:10.1186/s44147-023-00228-2

Zhao, S. Wang, and L. Zhang, “Block image encryption algorithm based on novel chaos and DNA encoding,” Information, vol. 14, 2023.DOI: 10.3390/info14030150

C. Zhang, S. Zhang, K. Liang, and Z. Chen, “Double image encryption algorithm based on parallel compressed sensing and chaotic system,” IEEE Access, vol. 12, pp. 54745–54757, 2024. DOI: 10.1109/ACCESS.2024.3389975

B. Han, Y. Jia, G. Huang, and L. Cai, “A medical image encryption algorithm based on Hermite chaotic neural network,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2020. DOI: 10.1109/ITNEC48623.2020.9085079

Z. Man, J. Li, X. Di, Y. Sheng, and Z. Liu, “Double image encryption algorithm based on neural network and chaos,” Chaos Solitons Fractals, vol. 152, no. 111318, p. 111318, 2021.DOI: 10.1016/j.chaos.2021.111318

Feng, “Image encryption algorithm combining chaotic image encryption and convolutional neural network,” Electronics, vol. 12, 2023.DOI: 10.3390/electronics12163455

Vijayakumar and A. Ahilan, “An optimized chaotic S-box for real-time image encryption scheme based on 4-dimensional memristive hyperchaotic map,” Ain Shams Eng. J., vol. 15, no. 4, p. 102620, 2024.DOI: 10.1016/j.asej.2023.102620

Kocak, U. Erkan, A. Toktas, and S. Gao, “PSO-based image encryption scheme using modular integrated logistic exponential map,” Expert Syst. Appl., vol. 237, no. 121452, p. 121452, 2024.DOI: 10.1016/j.eswa.2023.121452

M. Dalal and M. Juneja, “A survey on information hiding using video steganography,” Artif. Intell. Rev., vol. 54, no. 8, pp. 5831–5895, 2021.DOI: 10.1007/s10462-021-09968-0

R. Biswas, I. Mukherjee, and S. K. Bandyopadhyay, “Image feature based high capacity steganographic algorithm,” Multimed. Tools Appl., vol. 78, no. 14, pp. 20019–20036, 2019.DOI: 10.1007/s11042-019-7369-y

A. Hameed, M. Hassaballah, S. Aly, and A. I. Awad, “An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques,” IEEE Access, vol. 7, pp. 185189–185204, 2019. DOI: 10.1109/ACCESS.2019.2960254

A. AbdelRaouf, “A new data hiding approach for image steganography based on visual color sensitivity,” Multimed. Tools Appl., vol. 80, no. 15, pp. 23393–23417, 2021. DOI:10.1007/s11042-020-10224-w

Hussain, Q. Riaz, S. Saleem, A. Ghafoor, and K.-H. Jung, “Enhanced adaptive data hiding method using LSB and pixel value differencing,” Multimed. Tools Appl., vol. 80, no. 13, pp. 20381–20401, 2021.DOI: 10.1007/s11042-021-10652-2

Jing-yu, C. Hong, W. Gang, G. Zi-bo, and H. Zhang, “FPGA image encryption-steganography using a novel chaotic system with line equilibria,” Digit. Signal Process, vol. 134, no. 103889, p. 103889, 2023.DOI: 10.1016/j.dsp.2022.103889

M. R. Yanuar, S. Mt, C. Apriono, and M. F. Syawaludin, “Image-to-image steganography with Josephus permutation and least significant bit (LSB) 3-3-2 embedding,” Appl. Sci. (Basel), vol. 14, no. 16, p. 7119, 2024.DOI: 10.3390/app14167119

M. Z. Ali, O. Riaz, H. M. Hasnain, W. Sharif, T. Ali, and G. S. Choi, “Elevating image steganography: A fusion of MSB matching and LSB substitution for enhanced concealment capabilities,” Comput. Mater. Contin., vol. 79, no. 2, pp. 2923–2943, 2024. DOI: 10.32604/cmc.2024.049139

A. Rubaie, S. Fadhel, and K. M. Maher, “High capacity double precision image steganography based on chaotic maps,” Bulletin of Electrical Engineering and Informatics, vol. 13, pp. 320–331, 2024. DOI:10.11591/eei.v13i1.6055

N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image steganography: A review of the recent advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021. DOI: 10.1109/ACCESS.2021.3053998

J. Kunhoth, N. Subramanian, S. Al-Maadeed, and A. Bouridane, “Video steganography: recent advances and challenges,” Multimed. Tools Appl., vol. 82, no. 27, pp. 41943–41985, 2023.DOI: 10.1007/s11042-023-14844-w

A. Eyssa, F. E. Abdelsamie, and A. E. Abdelnaiem, “An efficient image steganography approach over wireless communication system,” Wirel. Pers. Commun., 2020. DOI:10.1007/s11277-019-06730-2

G. V. K. Murugan and R. Uthandipalayam Subramaniyam, “Performance analysis of image steganography using wavelet transform for safe and secured transaction,” Multimed. Tools Appl., vol. 79, no. 13–14, pp. 9101–9115, 2020.DOI: 10.1007/s11042-019-7507-6

Kaur and B. Singh, “A hybrid algorithm for robust image steganography,” Multidimens. Syst. Signal Process., vol. 32, no. 1, pp. 1–23, 2021. DOI https://doi.org/10.1007/s11045-020-00725-0

J. Sharafi, Y. Khedmati, and M. M. Shabani, “Image steganography based on a new hybrid chaos map and discrete transforms,” Optik (Stuttg.), vol. 226, no. 165492, p. 165492, 2021.DOI: https://doi.org/10.1016/j.ijleo.2020.165492

K. Sashi Rekha, M. Joe Amali, M. Swathy, M. Raghini, and B. Priya Darshini, “A steganography embedding method based on CDF-DWT technique for data hiding application using Elgamal algorithm,” Biomed. Signal Process. Control, vol. 80, no. 104212, p. 104212, 2023.DOI: https://doi.org/10.1016/j.bspc.2022.104212

Z. Saeidi, A. Yazdi, S. Mashhadi, M. Hadian, and A. Gutub, “High performance image steganography integrating IWT and Hamming code within secret sharing,” IET Image Process., vol. 18, no. 1, pp. 129–139, 2024.DOI: https://doi.org/10.1049/ipr2.12938

X. Duan, K. Jia, B. Li, D. Guo, E. Zhang, and C. Qin, “Reversible image steganography scheme based on a U-net structure,” IEEE Access, vol. 7, pp. 1–1, 2019. DOI: 10.1109/ACCESS.2019.2891247

Q. Li, X. Wang, X. Wang,B.Ma, C. Wang, Y. Xian, Y.Shi, “A novel grayscale image steganography scheme based on chaos encryption and generative adversarial networks,” IEEE Access, vol. 8, pp. 168166–168176, 2020. DOI: 10.1109/ACCESS.2020.3021103

J. Qin, J. Wang, Y. Tan, H. Huang, X. Xiang, and Z. He, “Coverless image steganography based on generative adversarial network,” Mathematics, vol. 8, no. 9, p. 1394, 2020.DOI: https://doi.org/10.3390/math8091394

Y. Shang, S. Jiang, D. Ye, and J. Huang, “Enhancing the security of deep learning steganography via adversarial examples,” Mathematics, vol. 8, no. 9, p. 1446, 2020.DOI: https://doi.org/10.3390/math8091446

A. Bahaddad, K. Ali Almarhabi, and S. Abdel-Khalek, “Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption,” Alex. Eng. J., vol. 75, pp. 41–54, 2023. DOI:https://doi.org/10.1016/j.aej.2023.05.051

L. Huo, R. Chen, J. Wei, and L. Huang, “A high-capacity and high-security image steganography network based on chaotic mapping and Generative Adversarial Networks,” Appl. Sci. (Basel), vol. 14, no. 3, p. 1225, 2024.DOI: https://doi.org/10.3390/app14031225

Z. Cheng, X. Jin, Q. Jiang, L. Wu, Y. Dong, and W. Zhou, “SIHNet: A safe image hiding method with less information leaking,” IET Image Process., vol. 18, no. 10, pp. 2800–2815, 2024.DOI: https://doi.org/10.1049/ipr2.13138

Y. Ramandi, M. Fateh, and M. Rezvani, “VidaGAN: Adaptive GAN for image steganography,” IET Image Process., 2024.DOI: https://doi.org/10.1049/ipr2.13177

A. S. Ali, S. Alsamaraee, and A. A. Hussein, “Optimize image steganography based on distinction disparity value and HMPSO to ensure confidentiality and integrity,” J. Comput. Netw. Commun., vol. 2024, no. 1, 2024.DOI: https://doi.org/10.1155/2024/2516567

P. Rachna, K. Lad, and M. Patel, “Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review,” Multimedia Systems, vol. 27, pp. 985–1024, 2021.DOI: 10.1007/s00530-021-00763-z

P. Rachna, L. Kalpesh, P. Mukesh, and D. Madhavi, “A hybrid DST-SBPNRM approach for compressed video steganography,” Multimedia Systems, vol. 27, pp. 417–428, 2021.DOI: https://doi.org/10.1007/s00530-020-00735-9

S. Abed, M. Al-Mutairi, A. Al-Watyan, O. Al-Mutairi, W. AlEnizy, and A. Al-Noori, “An automated security approach of video steganography–based LSB using FPGA implementation,” J. Circuits Syst. Comput., vol. 28, no. 05, p. 1950083, 2019.DOI: https://doi.org/10.1142/S021812661950083X

J. Mstafa, Y. M. Younis, H. I. Hussein, and M. Atto, “A new video steganography scheme based on Shi-Tomasi corner detector,” IEEE Access, vol. 8, pp. 161825–161837, 2020. DOI: 10.1109/ACCESS.2020.3021356

J. N. Shehab, H. A. Abdulkadhim, and T. F. H. Al-Tameemi, “Robust large image steganography using LSB algorithm and 5D hyper-chaotic system,” Bull. Electr. Eng. Inform., vol. 10, no. 2, pp. 689–698, 2021. DOI: https://doi.org/10.11591/eei.v10i2.2747

D. Mukesh and M. Juneja, “A secure video steganography scheme using DWT based on object tracking,” Information Security Journal: A Global Perspective, vol. 31, pp. 196–213, 2022.DOI: https://doi.org/10.1080/19393555.2021.1896055

F. Pingan, H. Zhang, and X. Zhao, “Robust video steganography for social media sharing based on principal component analysis,” EURASIP Journal on Information Security, vol. 2022, 2022. DOI https://doi.org/10.1186/s13635-022-00130-z

F. S. Hassan and A. Gutub, “Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 5, pp. 2017–2030, 2022.DOI: https://doi.org/10.1016/j.jksuci.2020.07.008

J. Cui, “Deeply-Recursive Attention Network for video steganography,” CAAI Transactions on Intelligence Technology, vol. 8, pp. 1507–1523, 2023.DOI: https://doi.org/10.1049/cit2.12191

G. F. Vergara, P. Giacomelli, A. L. Serrano, F. L. L. Mendonça, G. A. P. Rodrigues, G. D. Bispo, V. P. Gonçalves, R. C. Albuquerque, R. T. S. Júnior, “Stego-STFAN: A novel neural network for video steganography,” Computers, vol. 13, no. 7, p. 180, 2024.DOI: https://doi.org/10.3390/computers13070180

Y. Wang, “Hiding Data within Thumbnail Videos: An Adaptive Downsampling-Resilient Video Steganography Method,” IEEE Access, 2024. DOI: 10.1109/ACCESS.2024.3386798

A. Benlashram, M. Al-Ghamdi, R. AlTalhi, and P. Kaouther Laabidi, “A novel approach of image encryption using pixel shuffling and 3D chaotic map,” J. Phys. Conf. Ser., vol. 1447, no. 1, p. 012009, 2020. DOI 10.1088/1742-6596/1447/1/012009

K. J. Sher and J. Ahmad, “Chaos-based efficient selective image encryption,” Multidimensional Systems and Signal Processing, vol. 30, pp. 943–961, 2019. DOI https://doi.org/10.1007/s11045-018-0589-x

M. Yildirim, “A color image encryption scheme reducing the correlations between R, G, B components,” Optik (Stuttg.), vol. 237, no. 166728, p. 166728, 2021. DOI:https://doi.org/10.1016/j.ijleo.2021.166728

Sneha, S. Sankar, and A. S. Kumar, “A chaotic color image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps,” Journal of Ambient Intelligence and Humanized Computing, vol. 11, pp. 1289–1308, 2020.DOI: https://doi.org/10.1007/s12652-019-01385-0

R. Saidi, N. Cherrid, T. Bentahar, H. Mayache, and A. Bentahar, “Number of Pixel Change Rate and Unified Average Changing Intensity for sensitivity analysis of encrypted inSAR interferogram,” Ing. Syst. D Inf., vol. 25, no. 5, pp. 601–607, 2020. DOI: https://doi.org/10.18280/isi.250507

A. Sukumar, V. Subramaniyaswamy, V. Vijayakumar, and L. Ravi, “A secure multimedia steganography scheme using hybrid transform and support vector machine for cloud-based storage,” Multimed. Tools Appl., vol. 79, no. 15–16, pp. 10825–10849, 2020.DOI: https://doi.org/10.1007/s11042-019-08476-2

Singh, P. Agarwal, and M. Chand, “Image Encryption and Analysis using Dynamic AES,” in 2019 5th International Conference on Optimization and Applications (ICOA), 2019. DOI: 10.1109/ICOA.2019.8727711

S-box operation

Downloads

Published

2025-01-31

How to Cite

Majeed, N. D., Al-Askery , A. J., Hasan, F. S., & Abood, S. (2025). A Survey on Steganography and Image Encryption Techniques. Electrical Engineering Technical Journal, 2(1), 11–24. https://doi.org/10.51173/eetj.v2i1.13

Issue

Section

Engineering