You are on page 1of 21

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/353025779

Secure Data Transfer over Internet Using Image Steganography: Review

Article · July 2021


DOI: 10.9734/AJRCOS/2021/v10i330243

CITATION READS
1 1,470

10 authors, including:

Dakhaz Abdullah Siddeeq Yousif Ameen


Duhok Polytechnic University Duhok Polytechnic University
6 PUBLICATIONS   36 CITATIONS    110 PUBLICATIONS   675 CITATIONS   

SEE PROFILE SEE PROFILE

Azar Abid Salih Awder Ahmed


Duhok Polytechnic University Sulaimani Polytechnic University
30 PUBLICATIONS   577 CITATIONS    24 PUBLICATIONS   98 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Encoder and Decoder View project

LTE-Advanced, enhancing the edge user throughput View project

All content following this page was uploaded by Zryan Najat on 09 July 2021.

The user has requested enhancement of the downloaded file.


Asian Journal of Research in Computer Science

10(3): 33-52, 2021; Article no.AJRCOS.70381


ISSN: 2581-8260

Secure Data Transfer over Internet Using Image


Steganography: Review
Dakhaz Mustafa Abdullah1*, Siddeeq Y. Ameen1, Naaman Omar1,
Azar Abid Salih1, Dindar Mikaeel Ahmed1, Shakir Fattah Kak1,
Hajar Maseeh Yasin1, Ibrahim Mahmood Ibrahim1, Awder Mohammed Ahmed2
and Zryan Najat Rashid2
1
Duhok Polytechnic University, Duhok, Kurdistan Region, Iraq.
2
Sulaimani Polytechnic University, Sulaimani, Kurdistan Region, Iraq.

Authors’ contributions

This work was carried out in collaboration among all authors. All authors read and approved the final
manuscript.

Article Information
DOI: 10.9734/AJRCOS/2021/v10i330243
Editor(s):
(1) Dr. Francisco Welington de Sousa Lima, Universidade Federal do Piauí, Brazil.
Reviewers:
(1) Muhammad Sajjadur Rahim, University of Rajshahi, Bangladesh.
(2) Hiroyuki Hisamatsu, Osaka Electro-Communication University, Japan.
(3)Vani V, Bangalore Institute of Technology, India.
Complete Peer review History: http://www.sdiarticle4.com/review-history/70381

Received 01 May 2021


Review Article Accepted 06 July 2021
Published 06 July 2021

ABSTRACT
Whether it's for work or personal well-being, keeping secrets or private information has become
part of our everyday existence. Therefore, several researchers acquire an entire focus on secure
transmitting secret information. Confidential information is collectively referred to as Steganography
for inconspicuous digital media such as video, audio, and images. In disguising information,
Steganography plays a significant role. Traditional Steganography faces a further concern of
discovery as steganalysis develops. The safety of present steganographic technologies thus has to
be improved. In this research, some of the techniques that have been used to hide information
inside images have been reviewed. According to the hiding domain, these techniques can be
divided into two main parts: The spatial Domain and Transform Domain. In this paper, three
methods for each Domain have been chosen to be studied and evaluated. These are; Least
Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD),
contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine
Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR,
Capacity, and more robustness and security are discussed.
_____________________________________________________________________________________________________

*Corresponding author: E-mail: Fairoz.kareem@dpu.edu.krd;


Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

Keywords: Steganography; cryptography; robustness; security; spatial domain; transform domain.

1. INTRODUCTION hackers from discovering them [15,16].


Approaches for picture steganography have
In today's communication technology, been classified as spatial domain and frequency
photographs play a critical role in various domain techniques [17]. Steganography
disciplines, including military, social networking, techniques may be utilized to create an excellent
and biometric systems. Sensitive photos are tool for data exfiltration, network assaults, and
exchanged via unsecured networks, making it concealed communication between private
difficult to conceal them from outsiders [1]. The parties [18]. The purpose of these strategies is to
issue of hidden data communication has cover personal data (stereograms) within an
persisted throughout history. While cryptography innocent-looking carrier, such as user
is an efficient method of securing confidential communications [19].
data by rendering it unreadable to unauthorized
parties, the act of communicating with encrypted These days, Hacking has become a huge issue.
communications attracts attention [2]. This can Secure data transmission or communication over
be troublesome for a communication channel the Internet is problematic because of security
being watched by a third party, who can issues [20]. In the course of the ages, information
terminate contact between the two parties at the security has made many signs of progress [21].
slightest suspicion [3]. Two new approaches for safe data transfer over
the years are Steganography and cryptography
Meanwhile, research indicates that encryption [22]. Cryptography is the technique of text
alone may not be adequate to secure secret encryption, while Steganography is used to hide
communication [4]. Personal messages demand text within a multimedia element as if it were
an invisible communication route that, in some nothing [21]. Steganography secures the data as
instances, must be completely anonymous. As a if someone sees the file because human senses
result, a technique for concealing information is cannot recognize or sense the data within a
required [5,6]. multimedia element. They cannot perceive that
some secret message has hidden within it [23].
For millennia, the art of concealing information
has been evolving, and innovation and progress In the current world of communication, IoT is an
have always followed information security to emerging technology [24]. The safe data transfer
ensure the message reaches the intended in the IoT environment, as IoT devices are
destination without being tampered with [7]. growing every day, is the biggest problem [25].
Historically, cryptography and Steganography Single-board computers (SBCs) or
have been the two primary ways for microcontrollers transfer data to another IoT
safeguarding, concealing, and transmitting device [26]. The data obtained from these
messages [8,9]. Since the inception of the devices should be sent extremely safely to
Internet, one of the most critical communication prevent some ethical problems because of lower
and information technology aspects has been processing power and storage capability [27].
information security [10]. It is vital to safeguard There are several encryption methods used to
this data when it is transmitted across unsecured transmit data between IoT devices. However,
networks [11]. As a result, there is a need for there are clear opportunities for eavesdroppers
creating technologies that will assist in to suspect encrypted information [28].
preserving the integrity of digital information and Steganography Mechanism is used to prevent
ensuring the owners' intellectual property rights. suspicion like an additional layer of protection
This has resulted in a meteoric rise in the field of from adding more secure data transfers [29].
information concealment [12,13]. Based on IoT device capabilities, low complexity
pictures disguise data with various hidden
Cryptography is the art and science of creating algorithms [30].
ciphers to encode/encrypt communications and
information so that only authorized In the lives of individuals, the Internet now plays
communication parties can interpret and decrypt a significant role [31]. The world is connected via
them [14]. On the other hand, Steganography is the Internet. Any data transmitted or transmitted
a technique for concealing personal data and over the Internet is possible. The Internet, called
communications by embedding them in a cover the Internet of Things, also connects things [32].
material (image/audio/video) that prevents Safety is an uncompromising feature. Encryption

34
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

helps secure the data to a certain extent. Further, are still vulnerabilities that cause an attacker's
Picture Steganography is beneficial if data in the threat. B+trees are fast indexing and
shape of an image must be discreetly sent performance improvement methods
[33,34]. [54,55].

The progress of the Internet and technology The Internet of Things (IoT) is a realm where
makes communication of information faster and data is sent every second. The safety of this data
easier [35]. Without data safety, eavesdroppers is a complicated issue; however, cryptography
can illegally obtain private and secret and steganography techniques help minimize
information, which might cause serious harm to security difficulties [56]. These approaches are
any organization [36]. That means that essential for user authentication and data
the data should be secure and protected from confidentiality [57].
hackers while sharing confidential data
[37]. Much information is transmitted over the Internet
in the current day. To preserve privacy, this
For safe transmission of data over the Internet, information must be securely sent [58]. Many
data transmission is crucial in high safety and ways are created to convey this information
secrecy; the certainty of information is the most without third-party interception securely.
critical problem for network and internet Steganography is also approaching for the
communications [38, 39]. The information must secure transmission of data. In Steganography, it
be converted into a cryptic format to safeguard is disguised from the third party that there is
the data transferred from attackers [40]. Various protected information [48,59]. Only sender and
methods are used during transmission for recipient know about the delivery of secret
ensuring data privacy, such as Steganography information [60]. In Steganography, information is
and cryptography [41]. incorporated into a certain cover media such as
text, picture, audio, video, etc. [61]. The picture is
Rapid technological advancements and used as a cover for hiding hidden data in image
availability of sources have led to a great deal of steganography [62]. The most popular approach
essential knowledge being transmitted between for picture steganography consists of the least
individuals on the Internet in a few seconds [42]. essential bits (LSB), changed by secret message
Since the information is silent and delicate, it bits, of image pixels [63]. The LSB approaches
must be protected and maintained by general have numerous restrictions, which lead to the
confidentiality [43]. Many approaches and development of several other ways of picture
techniques may be used, so data worthy of steganography [64]. This approach is the Pixel
security can be retained [44]. The only downside Indicator Technique [65].
is that it is exceptionally costly to preserve this
anonymity [45]. A far more straightforward Secure data transfer through the Internet is a
approach to hide this critical information from any critical component of data exchange because
other source and to send it through the Internet data is a significant asset in internet
might be by utilizing Steganography technology communication [66]. Therefore, data security
[46]. Text, music, or even pictures might be the plays a crucial role in disseminating and
other source [47]. transmitting information via unsecured networks
[67]. Also, it entails protecting data against
Because of the constant technological progress, different kinds of threats, such as infiltration or
data may be transferred from one area to illegal Internet access. Various technology is
another [48]. The data will be hacked more used to enhance data security sent over the
probable by the attacker at the same time [49]. Internet, such as encryption, Steganography,
Numerous techniques, such as cryptography and watermarking, or Fingerprinting [68].
Steganography, safely transport the data to the Steganography uses the compression of data
target [50]. Because of its great quantity and and encryption to improve data security. It is
relevant information, the data is the most critical suitable for many data formats such as text,
item nowadays for an individual in an picture, audio, or video [69]. Data compression
organization [51]. However, it is vulnerable and techniques such as Discrete Cosine
more subject to assault [52]. Steganography Transformation (DCT) and Discrete Wavelet
securely hides chosen files in a filesystem, such Transformation (DWT) are utilized to provide
that an attacker cannot detect their presence more security and information privacy as various
without the associated access keys [53]. There transformations [70].

35
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

The Internet's use is now evolving every day Now information is transmitted over the Internet,
[71]. Data from diverse sources to other and there are enough hackers to hack this
countries is one of the significant applications of information because the data has been
the Internet. There are serious problems with transmitted via covert methods [85]. The data is
data protection during data transfer via the encrypted with cryptographic techniques, and a
Internet [72]. In data protection, two approaches third-party adversary may see the text, and the
are employed. Crystallization and Stegan- information can be retrieved using cryptanalysis
ography. Cryptography and Steganography are [86]. The main difficulty with the application of
utilized in our suggested system to make the cryptography is that unauthorized users see the
data safer [73]. Encryption and decryption are chip text. By employing Steganography, we may
the fundamental functions of cryptography. More prevent this [87]. Various methods for hiding
than 4 Times are encrypted here. The secret information in Steganography are available.
communication is essentially encrypted by an When data is integrated into the picture,
encryption key in the cryptography process. For transformation techniques produce more noise
transmitting a message, the sender utilizes the [88]. The LSB insert method is used to insert bits
encryption key [74]. On the other hand, the into a frame through random number generators
recipient should be aware of the encryption key to prevent distortion of the noise in the image
to decrypt the message for original data. Instantly [89].
Steganography is the method secret data may be
hidden through digital media coverage, such as This paper aims to evaluate the most popular
audio, image, video, and text [75]. techniques used for Steganography and
reviewed performance in terms of Peak Signal to
The security of information on mobile phones is Noise Ratio (PSNR), embedded capacity, and
complex when vast volumes of data are shared high robustness.
over the Internet [76]. Cryptography and
Steganography can provide secure information The rest of the paper is structured as follows—
transmission. Cryptography is a technology section II Brief review about Steganography.
providing specific communication encryption Section III & IV is about spatial Domain and
techniques. Steganography is a technique for transform Domain and its techniques reviewed in
hiding the information through the image this paper. A variety of practical steganography
message so that another person is unaware of techniques implementations reviewed in Section
the presence of the news in addition to the V. Assessment and recommendations in section
person addressed [77]. VI. a conclusion about the article is provided in
A mobile telephone user may transmit the Section VII.
message with multimedia subjects, including
photos, audio, or video clips, using a Multimedia 2. STEGANOGRAPHY: A BRIEF REVIEW
Messaging System (MMS) [78]. On the other
hand, hidden communication has become an Steganography is a technology that conceals
essential subject for debate, which has become critical information within video, audio, or picture
more and more important today as the Internet files and then transmits it [90] [91]. A hidden
develops. Steganography is one of the ways message can be hidden within a piece of
introduced for secret communication [79,80]. trustworthy information and conveyed without
This is, therefore, an intriguing concept for anybody being aware of it. Steganography
Steganography in MMS. One of the difficulties prevents unauthorized individuals from viewing
with steganography methods is that the the news since it is concealed within a carrier
password key between the sender and receiver and travels through the carrier. The message's
of encrypted data is sent between steganography carrier can be plaintext, audio, pictures, video, or
[81,82]. High security of multimedia data is the web [92]. In today's digital world, information
necessary for the current environment. This safe security and covert data transmission are
and secure method should ensure the network's evolving at a breakneck pace. It enables the
secrecy, authenticity, and integrity [83]. In an distribution of essential multimedia files by
electronic communication environment, the creating identical data copies. While sending
sensitive information sent through the Internet is secret information and files over the Internet is
compromised via Phishing. In various an insecure process, everyone has something to
applications, cryptographic methods are used to conceal [93]. On the other hand, today's
safeguard data transfer against malicious Steganography is substantially more complex,
assaults [84]. allowing users to cover vast quantities of data.

36
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

These types of Steganography are frequently straightforward to execute. The idea is to simply
used in conjunction with cryptography to secure substitute the message bit for the host image's
the information twice; first, the secret message is lowest bit value. Typically, both the message and
encrypted and then buried, so that an adversary the picture are transformed to an 8-bit binary
must first locate the data (an often tricky integer to facilitate it [97]. As a result, the LSB
operation in and of itself), as seen in Fig. 1, and technique often results in a high payload. After
then decrypt it [12]. concealing the hidden message, the cover
picture is almost identical to the image under
Several scholars have examined and examination. For example, suppose we are
investigated steganography approaches in recent attempting to disguise the character 'A' within an
years, producing numerous outstanding 8-bit image. In that case, the binary
steganography algorithms. Traditional representation for the eighth consecutive pixels
steganography algorithms may be classified from the image's top-left corner is as follows.
according to their embedding domain as spatial
domain algorithms or transform domain 00110111 11101001 10001010 00100111
algorithms, as seen in Fig. 2 [95]. 11001010 10101001 11001010 00110111
3. SPATIAL DOMAIN TECHNIQUES Then, successively (from left to right), the binary
representation of the letter 'A' (01100101) is
A two-dimensional matrix can be used to
embedded in the LSB's of the comparable binary
represent a picture, with each element
pattern of pixels. Eventually, the bits will
representing pixel intensity. Spatial Domain
generate the following way [98]:
refers to the state of two-dimensional matrices
that represent an image's intensity distribution.
00110110 11101001 10001011 00100110
This approach directly manipulates the picture
11001010 10101001 11001010 00110111
pixel. This approach conceals the secret data by
substituting selected bits from the cover picture
with the personal message's bit value. 3.2 Pixel Value Difference (PVD)
Steganography techniques are classified into
several categories according to their embedding This approach divides the cover picture into
domains, including least significant bit (LSB)- blocks that do not overlap. This time, we're going
based approaches, pixel value differencing to use the pixel difference between the split
(PVD)-based systems, and Exploiting blocks [99]. A significant difference value should
Modification Direction (EMD)-based approaches be taken into account in the edge area, while a
[96]. In this article, we will discuss only three small difference value should be taken into
strategies in the Spatial Domain: (LSB), (PVD), account in the smooth area. The human eye is
and (EMD). more sensitive to noise in a smooth region than
in an edge area. As a result, the difference value
3.1 Least Significant Bit (LSB) is substituted with another value to incorporate
the secret message bits. This approach is highly
LSB is a method that is commonly employed in invisible and has a large capacity for embedding
spatial domain steganography. This strategy is [100].

Fig. 1. Available steganography system [94]

37
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

Fig. 2. Types of Steganography techniques

3.3 Exploiting Modification Direction Discrete Cosine Transformation (DCT),


(EMD) Contourlet Transform, Wavelet Transform, and
Fourier Transform are all effective techniques in
Zhang and Wang (2006) proposed the Exploiting the transform domain [104]. We will concentrate
Modification Direction (EMD) methodology, which on these three approaches in this article
partitions the picture into various groups of n (Contourlet Transform), (DWT), and (DCT).
pixels to enter the secret digit into the (2n + 1)-
are encoding system [101]. Where n is a system 4.1 Contourlet Transform
parameter (n ≥ 1), because each group has n
pixels, there are 2n + 1 potential modifications Do and Vetterli presented the contourlet
(include one case in which no pixel is changed). transform as a novel two-dimensional picture
As a result of this concept, no more than one sparse representation technique in 2002. It can
pixel is increased or lowered by one. As a result, simultaneously assess the direction and size of
it has a high stego-image quality. To map these each picture and accurately portray the texture
2n + 1 situations, the embedding and extraction and Contour of the photograph [105]. The
technique must specify a one-to-one extraction contourlet transform's primary principle is to
function [102]. extract multiscale directional information. The
contourlet transform is an objective measure of
4. TRANSFORM DOMAIN TECHNIQUES an image's two-dimensional performance in two
dimensions since it can make degeneration in
Another option is to transform domain-based any direction and at any size. The contourlet
Steganography to conceal confidential data transform has a variety of advantageous
within the cover picture without being recognized properties, including multiresolution,
by humans. Despite its complexity, this strategy directionality, localization, and anisotropy, and it
is more efficient in suppressing information inside overcomes the wavelet transform's inadequacy
a picture by utilizing numerous algorithms and with directed data. A subset of the Discrete
transformations [103]. This methodology Wavelet Transform is the Contourlet Transform
operates by embedding the data in the signal's (DWT) [106]. The contourlet transform is
frequency domain, which is more robust than accomplished using a Pyramidal Directional Filter
time-domain embedding principles. As a result, it Bank (PDF). The first phase employs the
is often referred to as the embedding technique, Laplacian pyramid (LP) to break down the 2D
and numerous methods have been proposed. At data into a low pass and high pass sub-band. In
the moment, the most robust steganographic contrast, the angular decomposition stage uses
systems work in the area of transformations. directional filter banks (DFBs) to generate
Transform Domain Techniques are preferable to directional forms. CT is a directional
spatial domain techniques because they conceal representation of the signal that enables the
information in places less susceptible to inclusion of several directions for different signal
compression, cropping, and image processing. scales while achieving near-critical sampling
Discrete Wavelet Transformation (DWT), [107].

38
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

4.2 Discrete Wavelet Transformation A- EMBEDDING CAPACITY: The term


(DWT) "embedding capacity" refers to the quantity of
information that may be hidden inside a cover
DWT is a technique for segmenting information picture. Robustness refers to the ability to
contained in a picture into the approach and recover the stego-original image's confidential
signal detail. The LL bands include low pass information independently of the kind of
coefficients and copying techniques and processing used, e.g., cropping, scaling, and
additional information about various sub-signals filtering. Additionally, these goals may include
showing vertical, horizontal, or diagonal protection against steganalysis and the integrity
information or changes in an image. There are of hidden data. In an ideal world, a
numerous approaches for expressing pictures to steganography algorithm would increase
approach and signal features in the DWT embedding capacity while preserving the
method, one of which is wavelet Haar. A wavelet confidentiality and integrity of hidden data.
counting procedure may be utilized to
characterize a view using Wavelet Haar [108]. B- PSNR: The metric peak signal-to-noise ratio
Coefficients of the Haar DWT are calculated (PSNR) is used to determine the efficiency of the
using horizontal and vertical operations. suggested technique for concealing one picture
Horizontal operations decompose a picture into inside another. When confidential data is
low-frequency (L) and high-frequency (H) bands incorporated in Steganography. PSNR is a metric
(H). L is computed by averaging the horizontal that quantifies the noise ratio between the stego
values of the cover image's two successive picture and the original image. The better quality
pixels (i.e., left to right), whereas H is obtained by of the photo is when the PSNR value is more
subtracting the two [109]. outstanding.

4.3 Discrete Cosine Transformation (DCT) C- ROBUSTNESS: Robustness refers to the


ability of embedded data to remain intact when
the stego-image is subjected to transformations
One of the most often used and successful
such as linear and nonlinear filtering, random
image transformation techniques for converting a
noise addition, blurring or sharpening, rotations
picture from the spatial to the frequency domain.
and scaling, decimation or cropping, lossy
The DCT coefficients are adjusted according to
compression, and conversion from digital to
the secret data bits in basic DCT-based
analog and then back to digital.
Steganography. The concept is divided into its
appropriate high, medium, and low-frequency
D- SECURITY: Security refers to safeguard the
components using DCT steganography. The
data while also maintaining the user's privacy by
most critical details are found in the low-
preventing unwanted access. Steganography is a
frequency sub-bands, whereas the highest
kind of security that conceals the presence of
quality details are found in the high-frequency
confidential data. It has worked on hiding
bands [110]. It converts the picture from the
sensitive data (text, picture, audio, or video)
spatial to the frequency domain and splits it into
inside another text, image, audio, or video (the
three frequency areas, namely low frequency
cover).
(FL), middle frequency (FM), and high frequency
(HF) (FH). FL and FH are abbreviations for the
lowest and highest frequency components, 5.1 Literature Based on High Capacity
respectively. To make lossy compression
methods more resilient, FM is employed as the Subong et al. [111] propose a steganographic
embedding zone. As a consequence, the image technique in which the secret message's
transformation's security is rather good. In bit information replaces the LSBs of the cover
Steganography, DCT divides a picture into 8*8 image's RGB (red, green, blue) bytes, similar to
pixels blocks and then works from left to right many other LSB image steganographic
and top to bottom in the blocks [98]. techniques, except that the secret message's bits
go through a series of assessed and scored bit
5. LITERATURE REVIEW rotation and inversion operations before being
replaced. The recommended methodology
Recently, many works have been implemented produced less when comparing the PSNR and
using steganography techniques. So, in this MSE values of the stego picture generated by
section, some of these works will be elaborated this recommended method to the present four
as follows: bits per byte replacement approach of LSB

39
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

Replacement and Adaptive LSB Embedding The embedding is carried out using a dynamic
algorithms distortion. However, the proposed weighting array. This array is generated pseudo-
technique does not considerably improve randomly by running the message pixels through
security robustness. the eliminative hashing method. The
experimental findings indicate that the
A technique for picture steganography, methodology outperforms current state-of-the-art
Elharrouss et al. [112] developed a method methods in embedding capacity (payload) and
based on LSB coding. To conceal a picture decreased cover picture quality distortion.
within another. The suggested process begins by Steganography performed using the RS attack
combining the cover picture with the photos to be demonstrates that the suggested approach's
suppressed using the k-LSB approach. An area embedding is unidentifiable up to a 3 bits per
detection procedure utilizing the local entropy pixel (bpp) embedding rate. PSNR was 39.50.
filter has been proposed to determine the region
containing the concealed pictures. After By separating the n cover-pixels into two groups,
retrieving the covered picture, an image quality Liu et al. [116] introduce an enhanced
improvement approach was used to correct any GEMD(generalized exploiting modification
picture degradation caused by the concealing direction). The approach can increase GEMD's
methods. PSNR was 32.83 dB. embedding capability from n+1 to n+2 n bpp. The
experimental findings indicate that the technique
Swain [113] suggests two PVD approaches also produces high-quality stego-images.
based on overlapping 12-pixel blocks. The first Additionally, they provide an approach for
methodology embeds and extracts data using an generalizing the improved GEMD by separating n
adaptive quantization range table and modular cover-pixels into k groups. This generalized
arithmetic. The second methodology embeds extended GEMD may further improve embedding
and extracts data using a defined quantization capacity by increasing the parameter k; but, as k
range table and an addition/difference method. grows, the PSNR decreases. This methodology
The experimental results indicate that the may embed secret data using a suitable k to
proposed adaptive PVD technique has a greater strike a compromise between the embedding
embedding capacity (2,335,661) and a better capacity and the quality of stego pictures.
PSNR (42.97) than current adaptive PVD
methods. Still, the suggested non-adaptive PVD Elshazly et al. [117] proposed a novel approach
approach has a greater embedding capacity than for GEMD image steganography based on PSS-
current non-adaptive PVD techniques. IB to alleviate the drawbacks of previous EMD
approaches. Two essential criteria in
Zhou & Cao [114] proposed a steganography steganography procedures are the quality of the
technique combining PVD and matrix pattern stego-image and the capacity of the embedding
(MP) based on the difference of pixel texture, in payload. The proposed approaches embed data
which the former is classified into two parts, and at a rate of 3 x 0.5 x LVMA (up to 9 bpp), which
the binary message is then embedded in the is more than the R = 3 x (n + 1)/n of the GEMD
edge portion of the blue layer of the image technique. The techniques proposed are
without extracting the original image; the latter simulated in MATLAB, developed, then
algorithm generates MP representing 95 implemented using XSG on the Spartan 3E Kit.
characters. The blue layer's fourth to sixth bits Simulations and tests reveal that the proposed
are utilized for the MP algorithm, while the methodology can embed a big payload (up to
remaining bits are used for the PVD algorithm. 2,359,296 bits) while preserving a high-quality
Consequently, it was demonstrated that it stego-image (up to 50.15 dB).
supports a variety of embedded message
formats, is more resistant to detection, and Thanks and Surekha [118] present a color
possesses a high level of security. PSNR was picture steganography algorithm based on the
46.27, and the message capacity was 53,986. (FRT) Finite Ridgelet Transform and (DWT). The
FRT is used to generate the Ridgelet coefficients
Saha et al. [115] suggested EEMDHW, Extended for each color channel in the cover color image.
EMD-based steganography based on a Hashed- A single-level DWT is used to create the various
Weightage Array. Each of the cover image's K wavelet coefficients, which are then modified to
pixels contains two 2KN-any numbers, where N generate the stego color image using the
is the pixel's bit count. As a result, the payload is encrypted channel values from the secret color
entirely interchangeable when used in this way. image. Arnold scrambling is utilized to encrypt

40
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

channels of a hidden color picture in the to use. The stego picture also has a good
suggested approach. The proposed methodology imperceptibility quality, with a PSNR value
is evaluated on various standard color greater than 50 dB.
photographs, and the findings indicate that the
stego picture is more invisible than the previous Maji et al. [123] proposed A system in which one
methodology. Additionally, the suggested or more LSB bits of selected pixels are used
approach has a high embedding capacity. based on the difference in pixel intensity between
adjacent pixels in the cover image's two image
5.2 Literature-based High PSNR blocks. Secret bits are encrypted using OTP and
a randomly generated pre-shared key. Because
To get the best results, Anwar et al. [119] these encrypted bits are entirely random and
suggest an approach that combines LSB- resemble noise, the system is immune to a wide
steganography with AES and Base64 encryption. variety of statistical attacks. Comparative
This combination of techniques is effective. This simulations using many well-known PVD-based
is shown by the highest average PSNR value of approaches demonstrate favorable results for
around 60 dB in private images with an original visual imperceptibility and a variety of quality
size of 780x1040. At the same time, the lowest parameters, such as MSE (0.0637), PSNR
average PSNR value is 256x256 photographs (60.08), and capacity (3088) bit.
with a file size of 23 kb is around 48 dB. The
AES and Base64 encryption algorithms are used Saleh and Amirmazlaghani [124] provide a
to increase data security sent across susceptible unique multiplicative picture steganography
and unprotected networks. methodology for embedding hidden data in a
cover picture without altering it explicitly. To do
Rafrastara et al. [120] propose modifying the this, they use the contourlet transform to break
inverted LSB approach based on the second, down the image and separate the high-frequency
third, and fourth LSB bits. The strategy is tested sub-bands into blocks of coefficients. The
by assuming that each pixel of the cover picture personal data is then embedded using an
is pinned to one message bit. According to the embedding coefficient. During the extraction
testing results, the proposed approach improved step, we employ a Gaussian scale mixing
the quality of the stego picture created. The distribution to precisely extract the embedded
suggested technique can enhance the quality of data. Experiments demonstrate that our
stego pictures by minimizing the number of suggested methodology can achieve
changes in pixel values. It can eventually be imperceptibility while being undetectable by a
utilized to add message payload as the quality comparable steganalysis methodology.
increases.
Reshma et al. [125] describe a pixel prediction
AlWatyan et al. [121] suggested an automated algorithm based on picture steganography that
approach for secure communication with two uses the SVNN classifier and contourlet
layers of security. Data is encrypted using a transform. The proposed technique conceals
Java-developed encryption mechanism called sensitive data using the input as a medical image
Character Bit Shuffler (CBS) at the first level. The and the CT as a mask. To begin, the image's
encrypted information is then concealed within a effective pixels are identified using an error-
picture using the Least Significant Bit (LSB) based trained SVN. The classifier is fine-tuned
approach, which alters only the last bits of the using either the GA or the MS Algorithm. The
picture pixels. The LSB approach has the contourlet embeds the secret message into the
advantage of being accessible and maintaining input picture using the embedding strength and
the image's quality. the CT coefficient. Finally, depending on the CT
coefficient, the personal statement and the input
Astuti et al. [122] present a straightforward and picture are retrieved. The suggested work is
secure method for hiding messages using LSB experimented on using various noises in
methods. The XOR procedure is performed three photographs, and the images utilized in the
times to encrypt the message before it is placed analysis are obtained from the BRATS database.
on the LSB. Three MSB bits are used as keys in The proposed methodology delivers superior
XOR operations to assist the encryption and performance for measures such as correlation
decryption of communications. The findings of coefficient, PSNR, and SSIM with values of
this investigation demonstrate that this approach 89.3253 DB, 1, and 1 for the picture without
secures messages while being extremely simple employing noise. By introducing noise to the

41
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

concept, the correlation coefficient, PSNR, and Li and Chao [129] proposed a secure and blind
SSIM achieve 48.578, 0.6123, and 0.9934. watermarking approach based on a non-
subsampled contourlet transform and Schur
Nevriyanto et al. [126] describe a picture decomposition. The cover image is decomposed
steganography approach based on the Discrete using the two-level non-subsampled contourlet
Wavelet Transform and Singular Value transform, and the low pass sub-band is chosen
Decomposition. Using a text file as a watermark, for watermark insertion to increase its
transform it into an image and insert it into the robustness. Before integrating the watermark into
cover picture. They analyze the performance of the cover picture, it is jumbled using logistic
this approach and compare it to others such as chaotic and Arnold transformations to improve
the Least Significant Bit, the DCT, and the DWT security. Additionally, by utilizing a quantification
using the Peak Signal to Noise Ratio and Mean process, invisibility is accomplished. The
Squared Error. The findings of this experiment encrypted watermark sequence can be obtained
indicated that the DWT and Singular Value during the watermark extraction step without
Decomposition perform better together than the access to the host image. The suggested blind
LSB, the DCT, and the DWT alone. Peak Signal watermarking methodology beats several popular
Noise Ratios of 57.0519 and 56.9520, watermarking techniques regarding invisibility,
respectively, are obtained using DWT and robustness, and payload. Scalability and low
Singular Value Decomposition procedures. While pass filtering performance, on the other hand,
Mean Squared Error-values produced using may be enhanced further.
these methods are 0.1282 and 0.1311.
Najafi & Khaled [130] proposed a secure and
5.3 Literature-based Robustness robust picture watermarking approach based on
singular value decomposition (SVD) and sharp
Kukharska et al. [127] combined the PVD frequency localized contourlet transforms
technique with the Arnold transformation to build (SFLCT). The SVD and SFLCT are applied to
steganographic ways to hide data in BMP digital both watermarked and original photographs, and
images. To improve the robustness of noticeable results for watermarking demands are
steganographic alterations. The usage of keys generated by exploiting the SVD's characteristics
and the equally likely distribution of the and the SFLCT's benefits. Because most SVD-
steganographic container blocks and message based watermarking techniques are sensitive to
components all contribute to the greater security ambiguity attacks and have a false positive
of the steganographic message throughout its issue, this criticism may be addressed without
disguised transit via open communication adding extra steps to the watermarking
channels. The keys' space is proportionate to the algorithm. The suggested solution is safe and
picture container's size. The Arnold resistant to ambiguity attacks. The technique is
transformation period value is the inverse of this simulated, and its resilience to various forms of
number. In the sample Lena.bmp, the power of assaults is evaluated. Compared to some
the keyspace is 383. A PVD steganographic contemporary schemes, this one exhibits a high
approach combines two Arnold transformations level of imperceptibility, capacity, and
on a previously separated picture to hide robustness, making it an excellent choice for
information. image processing applications.
Shehab et al. [128] proposed a technique based
on the breakdown of the host image using the Subhedar and Vijay [131] present three
Contourlet transform's lowest energy sub-bands significant matrix factorization algorithms and the
(4 levels), scrambling the watermark image with contourlet transform for Steganography in the
the Ikeda identifying new locations using a transform domain. The security of image
modified Arnold Cat map. This improves security steganography is generally known to be primarily
and safety while also making Hacking more defined by the stego image's undetectability
difficult or impossible. Compared to prior when analyzed by a site analyzer to identify the
comparable attempts, the obtained data show presence of buried secret information. Good
that the offered technique is more resistant to imperceptibility means that the eavesdropper
attacks and more effective. The embedding area cannot detect the concealed information;
is also expanded by using the lowest energy sub- nevertheless, the stego image may be analyzed
bands, and this feature will be investigated in using specific statistical tests while being
future work with color imagery. broadcast over the channel. The secret is stored
in the matrix factorized components of the cover

42
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

image's contourlet coefficients, decomposed manipulation, geometric distortions and


using singular value decomposition (SVD), QR Checkmark assaults, and steganalysis detection
factorization, and nonnegative matrix assaults.
factorization (NMF). The various studies look at
the impact of matrix decomposition techniques Abdelkader and AlTamimi [134] suggested a
on essential picture steganography properties unique method for concealing the data of a
such as imperceptibility, robustness to different hidden image by utilizing Discrete Cosine
image processing procedures, and universal Transform (DCT) features in conjunction with a
steganalysis performance. Compared to current linear Support Vector Machine (SVM) classifier.
research, the suggested image steganography The DCT characteristics are used to reduce the
method has superior imperceptibility, large amount of redundant information in the image.
capacity, and low detection accuracy. Additionally, DCT is employed to incorporate the
Additionally, a comparison of three matrix secret message using the RGB's least significant
factorization algorithms is provided and bits. Each byte in the cover image is altered to
assessed. the point that it cannot be perceived by human
sight. The SVM is employed as a classifier to
Giri & Rumaan [132] describe a blind wavelet- accelerate the concealment process using DCT
based color picture watermarking technique that characteristics. The proposed strategy is
improves robustness and imperceptibility. The adopted, and the resulting improvements are
methodology mentioned above considers the considerable. Additionally, performance analysis
intrinsic neighborhood connection attribute of the is performed using the MSE, PSNR, NC,
image's pixels for watermark insertion using a processing time, capacity, and robustness
block-level method. The watermark's pixels are factors.
implanted in a specific region in this case. A
pseudorandom sequence is used to organize the 5.4 Literature-based High Security
picture blocks for watermark insertion. Only the
components with a higher frequency are utilized. Murugan and Ragupathy [135] present the
In each example, the watermark is a 32 X 32 Discrete Wavelet Transform (DWT), which has
grayscale picture. The experimental findings several benefits over existing transform
indicate that the provided strategy is more techniques such as (DCT) (Discrete Cosine
resilient and transparent than specific previous Transform). This is due to the scalability of the
state-of-the-art procedures. quality, the interest in area coding, the low bit
rate transmission that enables high-speed
Rabie et al. [133] introduce a high-capacity operation, and the compatibility with the Visual
picture concealing system that improves the System used by humans, which gives high
quality of stego images. This novel concealment perception quality. Geometric attack introduces
technique uses a multi-scale Laplacian pyramid synchronization issues between the initial picture
of the cover picture in the Discrete Wavelet and the retrieved stego picture during the
Transform (DWT) domain. All Previously detection technique, which modifies their
published work either increased capacity at the locations. Wavelet Space - frequency attribute of
expense of stego quality or improved stego localization - analyzes image characters skillfully,
quality at the cost of accommodation, although at adding additional strength to attacks such as
a lower power. The suggested strategy will boost geometric. This characteristic increases the
the hiding capability of the cover picture by embedding area while also increasing security.
concealing in the highest-level Laplacian pyramid As a result, DWT produces a high level of
of the DWT low-frequency band utilizing a curve imperceptibility and a PSNR in the region of 30-
fitting adaptive area technique in the spectral 54 dB.
magnitude discrete cosine transform domain. In
comparison to competing approaches, the Zhang et al. [136] present a novel coverless
suggested process achieves a higher level of picture steganography technique based on the
visual authenticity and capacity. Comparative DCT and Latent Dirichlet Allocation topic
experimental findings demonstrate that the categorization to increase the robustness and
recommended technique surpasses capacity to resist picture steganography. To
contemporary methods regarding payload begin, the picture database is classified using the
capacity and various picture quality metrics. Its LDA topic model. Second, photos associated
resistance further shows the suggested with a single subject are picked, and an 8*8 block
scheme's robustness to data loss and noise DCT transform is applied to them. Then, using

43
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

the relationship between the Direct Current singleton value embedding. Additional security
coefficients in neighboring blocks. Finally, an was provided by encrypting sensitive medical
inverted index is constructed containing the pictures using the chaotic logistic map, which
feature sequence, dc, coordinates of the place, further improved the technique's resilience. The
and the picture path. To achieve picture suggested scheme's efficacy was compared to
steganography, the secret information is comparable methods published before using
transformed into a binary series and segmented. common characteristics such as imperceptibility,
The picture with the feature sequence matching robustness, and resistance to multiple geometric
the personal information segments is chosen as transformation assaults. This methodology was
the cover image based on the index. Following found to be superior to other ways. Validation
that, the recipient receives all cover photos. was conducted using the UCID benchmarking
Throughout the procedure, no alteration is made database.
to the source photographs. The experimental
findings and analyses demonstrate that the Kaur and Butta [138] developed a unique hybrid
proposed technique can evade detection by methodology for undetectable and resilient
current steganalysis methods, is more resistant picture steganography in the context of secure
to conventional image processing, and is more data exchange. The innovation of this work lies in
resistant to subjective detection than current the laborious adjustment of the Discrete Cosine
coverless picture steganography techniques. Transform's (DCT) higher frequency coefficients
Meanwhile, it is somewhat immune to geometric to retain the image's perceptual quality, followed
assault. It has significant application potential in by the embedding of secret bits through random
the secure transfer of large amounts of data in a locations chosen by the deterministic Coupled
big data environment. Chaotic Map (CCM). All of the test suites
developed by the National Institute of Standards
Arunkumar et al. [137] present a complete and Technology, DIEHARD, ENT, and TestU01
picture steganographic technique based on a validate that the CCM map is random. The
combination of the Redundant Integer Wavelet experimental findings reveal that the suggested
Transform (RIWT), Discrete Wavelet Transforms methodology produces high-quality stego-images
(DCT), Singular Value Decomposition (SVD), with a zero Bit Error Rate when the embedding
and the chaotic logistic map. Because RIWT is a capacity is maximized (EC). Malevolent users
consistent shift approach, this suggested cannot exploit the recommended approach, and
methodology achieves reversibility and it beats standard steganography approaches in
robustness. A higher degree of imperceptibility terms of EC and Peak Signal to Noise
was attained by combining SVD and DCT with Ratio.

Table 1. Table of comparison

Ref Table of Comparison


year Image size Size of Secret data Methods PSNR
Anwar et al [119] 2019 1040*780 2 kb.txt LSB 52.19 dB
AlWatyan et al [121] 2017 100*100 1857 bytes LSB 54.16 dB
Swain [113] 2018 512*512 2357010 bit PVD 42.91
Zhou & Cao [114] 2019 1024*768 53294 bit PVD 46.59
Maji et al. [123] 2019 256*256 3088 bit PVD 60.08 dB
Saha et al. [115] 2020 512 * 512 4 bpp EMD 34.74 dB
Elshazly et al. [117] 2018 512 * 512 2,359,296 bits GEMD 50.15 dB
Saleh& Amirmazlaghani 2017 512*512 16384 bit contourlet 52.8 dB
[124]
Subhedar & Vijay [131] 2019 512*512 image 512*512 CT-QR 56.67 dB
Thanki & Surekha [118] 2018 256*256 1572864 bit DWT & 58.99 dB
FRT
Rabie et al [133] 2018 512*512 20.48 bpp DWT- 43 dB
LPAR
Murugan and Ragupathy 2019 512*512 45.8 kb DWT 48.85 dB
[135]
Kaur & Butta [138] 2021 512*512 212,890 DCT 33.04 dB
Arunkumar et al [137] 2019 512*512 Secret image size 256 SVD & 50.12 dB
*256 DCT

44
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

Qu et al. [139] offer a unique quantum picture the previous section. Also, many criteria can be
steganography algorithm. The EMD embedding used to assess the accuracy of the method. The
technique is a practical embedding approach that most well-known standards are (PSNR, capacity,
involves embedding the secret digit from a (2N + robustness, and security) as it is challenging to
1)-are notational system into a carrier pixel-group obtain the highest value in terms of all mentioned
made up of N pixels, with just one carrier pixel criteria. Therefore, it was challenging for the
raised or reduced by 1. The feasibility of researchers to devise new methods to balance
designing a specialized quantum circuit to these criteria to get the highest importance.
accomplish the EMD embedding is high. Some Accordingly, we divided the literature into four
simulations based on MATLAB are also provided sections: (PSNR, capacity, robustness, and
to assess the new algorithm's performance. It security).
can be demonstrated that the proposed method
has high imperceptibility and security by Researchers [111-118] tried to obtain high
examining the visual effect between the original capacity via using several algorithms, where the
carrier pictures and the equivalent stego pictures, highest embedding capacity was obtained by
comparing histogram graphs, and calculating [118], which was 2,359,296 bits, while [113]
PSNR and BER values. reached 2,357,010 bits. However, we
recommend the researcher's method [118]
6. CONCLUSION because the researcher could retain the PSNR,
which was 51.15. although the (PSNR) value
To transmit essential data safely and obtained by [117] was 58.99, the embedding
confidentially, there are two methods: either capacity was less than the previously mentioned
hiding or encrypting information. The science of methods, reaching 1,572,864 bits.
data hiding is called Steganography. The data
could be hidden in digital media such as On the other hand, to obtain the highest value for
(pictures, audio, and video). With the continuous (PSNR), the researcher [123] achieved the
development in Steganography, with traditional highest value of PSNR, which was 60.08, but the
data masking techniques, there is a risk that the embedding capacity was only 3088 bits.
confidential data will be exposed. In this However, this method may not be helpful for
research, we review some of the methods used cases that required high embedding capacity.
to hide information inside images. These
techniques can be divided into two main parts, Hence, we can notice many ways to obtain high
Spatial Domain, and Transform Domain. Also, values for inclusion and (PSNR). Still, robustness
each technique is divided into several algorithms, and security must be verified to ensure that
which are Least Significant Bit (LSB), Pixel Value unauthorized persons cannot view the
Difference (PVD), Exploiting Modification information that has been hidden. As noted in
Direction (EMD), contourlet transform, Discrete Table 1, the method that is presented by [131],
Wavelet Transformation (DWT) and, Discrete which managed to obtain the highest value in
Cosine Transformation (DCT). We reviewed the terms of robustness by embedding an image
best results in terms of highest PSNR, capacity, (512 * 512) and (PSNR) was 56.67 with high
and more robustness and security. As shown robustness. While To obtain high security, the
from the results obtained by the researchers, we best results were obtained by the work presented
can determine the best two methods: CT-QR by by [138], where it was able to embed an image
[64] and DCT [71], which are reviewed in this size (256 * 256), and the value (PSNR) was
paper. 50.12.

As a future direction in this field, we suggest Through our review of the previous works, we
working on Blockchain-based image recommend both methods [131] and [138] since
steganography for updating and sharing COVID- they could obtain high Security and PSNR.
19 data in decentralized hospitals' intelligence
architecture. DISCLAIMER

7. ASSESSMENT AND RECOMME- The products used for this research are
NDATION commonly and predominantly use products in our
area of research and country. There is absolutely
Several methods and algorithms have been used no conflict of interest between the authors and
in the literature for hiding data, as observed from producers of the products because we do not

45
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

intend to use these products as an avenue for Different Techniques," Asian Journal of
any litigation but for the advancement of Research in Computer Science. 2021;1-
knowledge. Also, the research was not funded by 17.
the producing company rather it was funded by 10. Salih AA, Ameen SY, Zeebaree SR,
personal efforts of the authors. Sadeeq MA, Kak SF, Omar N, et al. "Deep
Learning Approaches for Intrusion
COMPETING INTERESTS Detection," Asian Journal of Research in
Computer Science. 2021;50-64.
Authors have declared that no competing 11. AL_Zubaidy MA, AL Janaby AO, Ameen
interests exist. SY. "5G Scheduling Algorithm For
Capacity Improvement Using Beam
REFERENCES Division at Congested Traffic," Journal of
Engineering Science and Technology.
1. Rajendran S, Doraipandian M. "Chaotic 2021;16:1977-1990.
map based random image steganography 12. Khuma ZN. "Secure Data Transfer using
using lsb technique," IJ Network Security. RSA and Steganography; 2019.
2017;19:593-598. 13. Mohammed K, Ameen S. "Performance
2. Ismael HR, Ameen SY, Kak SF, Yasin HM, investigation of distributed orthogonal
Ibrahim IM, Ahmed AM, et al. "Reliable space-time block coding based on relay
Communications for Vehicular Networks," selection in wireless cooperative systems;"
Asian Journal of Research in Computer 2019.
Science. 2021;33-49. 14. Fawzi LM, Alqarawi SM, Ameen SY,
3. A. Khaldi, "Steganographic Techniques Dawood SA. "Two Levels alert verification
Classification According to Image Format," technique for smart oil pipeline surveillance
International Annals of Science. 2020;8: system (SOPSS)," International Journal of
143-149. Computing and Digital Systems. 2019;8:
4. Abdullah RM, Ameen SY, Ahmed DM, Kak 115-124.
SF, Yasin HM, Ibrahim IM. et al. 15. Das R, Chatterjee P. "Securing data
"Paralinguistic Speech Processing: An transfer in IoT employing an integrated
Overview," Asian Journal of Research in approach of cryptography &
Computer Science. 2021;34-46. steganography," in Proceedings of the
5. Haref QM, Taha MS, M. Rahim MS, International Conference on High
Hashim MM, Ahmad AMB. Rifa'i, Performance Compilation, Computing and
Categorization of spatial domain Communications. 2017;17-22.
techniques in image steganography: A 16. Al-Sultan MR, Ameen SY, Abduallah WM.
revisit," Journal of Advanced Research in "Real time implementation of stegofirewall
Dynamical and Control Systems. 2021;10: system," International Journal of
1538-1551. Computing and Digital Systems. 2019;8:
6. Ibrahim IM, Ameen SY, Yasin HM, Omar 498-504, 2019.
N, Kak SF, Rashid ZN, et al. "Web Server 17. Al Janaby AO, Al-Omary A, Ameen SY, Al-
Performance Improvement Using Dynamic Rizzo HM. "Tracking high-speed users
Load Balancing Techniques: A Review," using SNR-CQI mapping in LTE-A
Asian Journal of Research in Computer networks," in International Conference on
Science. 2021;47-62. Innovation and Intelligence for Informatics,
7. Ahmed DM, Ameen SY, Omar N, Kak SF, Computing, and Technologies (3ICT),
Rashid ZN, Yasin HM, et al. "A State of Art 2018;1-7.
for Survey of Combined Iris and Fingerprint 18. Othman A, Ameen SY, Al-Rizzo H.
Recognition Systems," Asian Journal of Dynamic switching of scheduling algorithm
Research in Computer Science. 2021;18- for," International Journal of Computing
33. and Network Technology. 2018;6.
8. Osuolale AF. "Secure data transfer over 19. Awadh WA, Hashim AS. "Using
the internet using image steganography for secure data storage in
cryptosteganography," Int. J. Sci. Eng. cloud computing," International Research
Res. 2017;8:1115-1121. Journal of Engineering and Technology
9. Maulud DH, Ameen SY, Omar N, Kak SF, (IRJET). 2017;4.
Rashid ZN, Yasin HM, et al. "Review on 20. Ameen SY, Ali ALSH. "A comparative
Natural Language Processing Based on study for new aspects to quantum key

46
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

distribution," Journal of Engineering and 31. Yahia HS, Zeebaree SR, Sadeeq MA,
Sustainable Development. 2018;11:45-57. Salim NO, Kak SF, Adel AZ, et al.,
21. Fawzi LM, Ameen SY, Alqaraawi SM, "Comprehensive survey for cloud
Dawwd SA. "Embedded real-time video computing based nature-inspired
surveillance system based on multi-sensor algorithms optimization scheduling," Asian
and visual tracking," Appl. Math. Infor. Sci. Journal of Research in Computer Science.
2018;12:345-359. 2021;1-16.
22. Ali ZA, Ameen SY. "Detection and 32. Ageed ZS, Zeebaree SR, Sadeeq MM,
prevention cyber-attacks for smart Kak SF, Rashid ZN, Salih AA, et al. "A
buildings via private cloud environment," survey of data mining implementation in
International Journal of Computing and smart city applications," Qubahan
Network Technology. 2018;6:27-33, 2018. Academic Journal. 2021;1:91-99.
23. Hamed ZA, Ahmed IM, Ameen SY, 33. Al Janaby AO, Al-Omary A, Ameen SY, Al-
"Protecting Windows OS Against Local Rizzo H. "Tracking and Controlling High-
Threats Without Using Antivirus," relation. Speed Vehicles Via CQI in LTE-A
2020;29:64-70. Systems," International Journal of
24. Fawzi LM, Ameen SY, Dawwd SA, Computing and Digital Systems. 2020;9:
Alqaraawi SM. "Comparative study of ad- 1109-1119.
hoc routing protocol for oil and gas 34. Ageed ZS, Zeebaree SR, Sadeeq MA,
pipelines surveillance systems," Abdulrazzaq MB, Salim BW, Salih AA, et
International Journal of Computing and al. "A state of art survey for intelligent
Network Technology. 2016;4. energy monitoring systems," Asian Journal
25. Farhan FY, Ameen SY. "Improved hybrid of Research in Computer Science. 2021;
variable and fixed step size least mean 46-61.
square adaptive filter algorithm with 35. Abdulqadir HR, Zeebaree SR, Shukur HM,
application to time varying system Sadeeq MM, Salim BW, Salih AA, et al. "A
identification," in 2015 10th System of study of moving from cloud computing to
Systems Engineering Conference (SoSE), fog computing," Qubahan Academic
2015;94-98. Journal. 2021;1:60-70.
26. Othman A, Ameen SY, Al-Rizzo H. "A new
36. Shukur H, Zeebaree S, Zebari R,
channel quality indicator mapping scheme Zeebaree D, Ahmed O, Salih A. "Cloud
for high mobility applications in LTE
computing virtualization of resources
systems," Journal of Modeling and allocation for distributed systems," Journal
Simulation of Antennas and Propagation. of Applied Science and Technology
2015;1:38-43.
Trends. 2020;1:98-105.
27. Othman A, Othman SY, Al-Omary A, Al-
37. Sharif KH, Ameen SY. "A Review of
Rizzo H. "Comparative performanceof
Security Awareness Approaches With
subcarrier schedulers in uplink LTE-A
Special Emphasis on Gamification," in
under high users' mobility," International
2020 International Conference on
Journal of Computing and Digital Systems.
Advanced Science and Engineering
2015;4.
(ICOASE). 2020;151-156.
28. Othman A, Ameen SY, Al-Rizzo H. "An
energy-efficient MIMO-based 4G LTE-A 38. Abdulla AI, Abdulraheem AS, Salih AA,
adaptive modulation and coding scheme Sadeeq M, Ahmed AJ, Ferzor BM, et al.
for high mobility scenarios," International "Internet of things and smart home
Journal of Computing and Network security," Technol. Rep. Kansai Univ.
Technology. 2015;3. 2020;62:2465-2476.
29. Ameen SY. "Advanced encryption 39. Abdulraheem AS, Salih AA, Abdulla AI,
standard (AES) enhancement using Sadeeq M, Salim N, Abdullah H, et al.
artificial neural networks," Int J of Scientific "Home automation system based on IoT;
& Engineering Research. 2014;5. 2020.
30. Zeebaree S, Ameen S, Sadeeq M. "Social 40. Salih AA, Zeebaree S, Abdulraheem AS,
media networks security threats, risks and Zebari RR, Sadeeq M, Ahmed OM.
recommendation: A case study in the "Evolution of mobile wireless
kurdistan region," International Journal of communication to 5G revolution,"
Innovation, Creativity and Change. 2020; Technology Reports of Kansai University.
13:349-365. 2020;62:2139-2151.

47
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

41. Khalid LF, Ameen SY. "Secure Iot 52. Zeebaree S, Zebari I. "Multilevel
integration in daily lives: A review," Journal client/server peer-to-peer video
of Information Technology and Informatics. broadcasting system," International Journal
2021;1:6-12. of Scientific & Engineering Research.
42. Dino HI, Zeebaree S, Salih AA, Zebari RR, 2014;5:260-265.
Ageed ZS, Shukur HM, et al. "Impact of 53. Taher KI, Saeed RH, Ibrahim RK, Rashid
Process Execution and Physical Memory- ZN, Haji LM, Omar N, et al. "Efficiency of
Spaces on OS Performance," Technology semantic web implementation on cloud
Reports of Kansai University. 2020;62: computing: A review," Qubahan Academic
2391-2401. Journal. 2021;1:1-9.
43. Ageed ZS, Zeebaree SR, Sadeeq MM, 54. Amanuel SVA, Ameen SYA. "Device-to-
Kak SF, Yahia HS, Mahmood MR. et al. device communication for 5G security: A
"Comprehensive survey of big data mining Review, Journal of Information Technology
approaches in cloud systems," Qubahan and Informatics. 2021;1:26-31.
Academic Journal. 2021;1:29-38. 55. Zebari S. Yaseen NO. "Effects of parallel
44. Abdulrahman LM, Zeebaree SR, Kak SF, processing implementation on balanced
Sadeeq MA, Adel AZ, Salim BW, et al. "A load-division depending on distributed
state of art for smart gateways issues and memory systems," J. Univ. Anbar Pure Sci.
modification," Asian Journal of Research in 2011;5:50-56.
Computer Science. 2021;1-13. 56. Sadeeq MM, Abdulkareem NM, Zeebaree
45. Yazdeen AA, Zeebaree SR, Sadeeq MM, SR, Ahmed DM, Sami AS, Zebari RR. "IoT
Kak SF, Ahmed OM, Zebari RR. "FPGA and Cloud computing issues, challenges
implementations for data encryption and and opportunities: A review," Qubahan
decryption via concurrent and parallel Academic Journal. 2021;1:1-7.
computation: A review," Qubahan 57. Aziz ZAA, Ameen SYA. "Air pollution
Academic Journal. 2021;1:8-16. monitoring using wireless sensor
46. Malallah H, Zeebaree SR, Zebari RR, Networks," Journal of Information
Sadeeq MA, Ageed ZS, Ibrahim IM, et al. Technology and Informatics. 2021;1:20-25.
58. Kareem FQ, Zeebaree SR, Dino HI,
"A comprehensive study of kernel (issues
Sadeeq MA, Rashid ZN, Hasan DA, et al.
and concepts) in different operating
systems," Asian Journal of Research in A survey of optical fiber communications:
challenges and processing time
Computer Science. 2021;16-31.
influences," Asian Journal of Research in
47. Abdullah DM, Ameen SY. "Enhanced
Computer Science. 2021;48-58.
Mobile Broadband (EMBB): A review,"
59. Omer MA, Zeebaree SR, Sadeeq MA,
Journal of Information Technology and
Salim BW, Mohsin SX, Rashid ZN, et al.
Informatics. 2021;1:13-19.
"Efficiency of malware detection in android
48. Ibrahim IM. "Task scheduling algorithms in system: A survey," Asian Journal of
cloud computing: A review," Turkish Research in Computer Science. 2021;59-
Journal of Computer and Mathematics 69.
Education (TURCOMAT). 2021;12:1041- 60. Rashid ZN, Zeebaree S, Sengur A. Novel
1053. remote parallel processing code-breaker
49. Zebari IM, Zeebaree SR, Yasin HM. Real system via cloud computing," ed: TRKU;
time video streaming from multi-source 2020.
using client-server for video distribution," in 61. Rashid ZN, Zeebaree SR, Shengul A.
2019 4th Scientific International Design and analysis of proposed remote
Conference Najaf (SICN). 2019;109-114. controlling distributed parallel computing
50. Yasin HM, Zeebaree SR, Zebari IM. system over the cloud," in 2019
"Arduino based automatic irrigation International Conference on Advanced
system: Monitoring and SMS controlling," Science and Engineering (ICOASE). 2019;
in 2019 4th Scientific International 118-123.
Conference Najaf (SICN). 2019;109-114. 62. Rashid ZN, Zebari SR, Sharif KH, Jacksi
51. Zeebaree S, Yasin HM. "Arduino based K. "Distributed cloud computing and
remote controlling for home: power saving, distributed parallel computing: A review," in
security and protection," International International Conference on Advanced
Journal of Scientific & Engineering Science and Engineering (ICOASE).
Research. 2014;5:266-272. 2018;167-172.

48
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

63. Rashid ZN, Sharif KH, Zeebaree S. International Conference on Advanced


"Client/Servers clustering effects on CPU Science and Engineering (ICOASE). 2020;
execution-time, CPU usage and CPU Idle 199-204.
depending on activities of Parallel- 73. Ageed ZS, Ibrahim RK, Sadeeq M. "Unified
Processing-Technique operations," Int. J. ontology implementation of cloud
Sci. Technol. Res. 2018;7:106-111. computing for distributed systems," Current
64. Jijo BT, Zeebaree SR, Zebari RR, Sadeeq Journal of Applied Science and
MA, Sallow AB, Mohsin S, et al. "A Technology. 2020;82-97.
comprehensive survey of 5G mm-wave 74. Sulaiman MA, Sadeeq M, Abdulraheem
technology design challenges," Asian AS, Abdulla AI. "Analyzation study for
Journal of Research in Computer Science. gamification examination fields," Technol.
2021;1-20. Rep. Kansai Univ. 2020;62:2319-2328.
65. Abdullah SMSA, Ameen SYA, Sadeeq MA, 75. Hassan RJ, Zeebaree SR, Ameen SY, Kak
Zeebaree S. Multimodal emotion SF, Sadeeq MA, Ageed ZS. et al., "State of
recognition using deep learning, Journal of art survey for iot effects on smart city
Applied Science and Technology Trends. technology: challenges, opportunities, and
2021;2:52-58. solutions," Asian Journal of Research in
66. Sadeeq MA, Zeebaree S. Energy Computer Science. 2021;32-48.
management for internet of things via 76. Sadeeq M, Abdulla AI, Abdulraheem AS,
distributed systems," Journal of Applied Ageed ZS. "Impact of electronic commerce
Science and Technology Trends. 2021;2: on enterprise business," Technol. Rep.
59-71. Kansai Univ. 2020;62:2365-2378.
67. Maulud DH, Zeebaree SR, Jacksi K, 77. Haji SH, Zeebaree SR, Saeed RH, Ameen
Sadeeq MAM, Sharif KH. "State of art for SY, Shukur HM, Omar N, et al.
semantic analysis of natural language Comparison of Software Defined
processing," Qubahan Academic Journal. Networking with Traditional Networking,"
2021;1:21-28. Asian Journal of Research in Computer
68. Hasan DA, Hussan BK, Zeebaree SR, Science. 2021;1-18.
Ahmed DM, Kareem OS, Sadeeq MA. The 78. Alzakholi O, Shukur H, Zebari R, Abas S,
impact of test case generation methods on Sadeeq M. "Comparison among cloud
the software performance: A review," technologies and cloud performance,"
International Journal of Science and Journal of Applied Science and
Business. 2021;5:33-44. Technology Trends. 2020;1:40-47.
69. Shukur H, Zeebaree SR, Ahmed AJ, 79. Ageed Z, Mahmood MR, Sadeeq M,
Zebari RR, Ahmed O, Tahir BSA, et al. "A Abdulrazzaq MB, Dino H. "Cloud
state of art survey for concurrent computing resources impacts on heavy-
computation and clustering of parallel load parallel processing approaches,"
computing for distributed systems," Journal IOSR Journal of Computer Engineering
of Applied Science and Technology (IOSR-JCE). 2020;22:30-41.
Trends. 2020;1:148-154. 80. Dino HI, Zeebaree SR, Hasan DA,
70. Yasin HM, Zeebaree SR, Sadeeq MA, Abdulrazzaq MB, Haji LM, Shukur HM.
Ameen SY, Ibrahim IM, Zebari RR, et al. "COVID-19 Diagnosis Systems Based on
IOT and ICT based Smart Water Deep Convolutional Neural Networks
Management, Monitoring and Controlling Techniques: A Review," in 2020
System: A Review," Asian Journal of International Conference on Advanced
Research in Computer Science. 2021;42- Science and Engineering (ICOASE). 2020;
56. 184-189.
71. Jacksi K, Ibrahim RK, Zeebaree SR, 81. Izadeen GY, Ameen SY. "Smart Android
Zebari RR, Sadeeq MA. "Clustering Graphical Password Strategy: A Review,"
documents based on semantic similarity Asian Journal of Research in Computer
using HAC and K-mean algorithms," in Science. 2021;59-69.
2020 International Conference on 82. Zebari RR, Zeebaree SR, Sallow AB,
Advanced Science and Engineering Shukur HM, Ahmad OM, Jacksi K.
(ICOASE). 2020;205-210. Distributed Denial of Service Attack
72. Sadeeq MA, Abdulazeez AM. "Neural Mitigation using High Availability Proxy and
networks architectures design, and Network Load Balancing," in 2020
applications: A review," in 2020 International Conference on Advanced

49
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

Science and Engineering (ICOASE). 2020; Sets and Data Analysis (IJRSDA). 2017;4:
174-179. 55-70.
83. Sallow A, Zeebaree S, Zebari R, Mahmood 94. Yahaya MM, Ajibola A. "Cryptosystem for
M, Abdulrazzaq M, Sadeeq M. "Vaccine Secure Data Transmission using Advance
tracker," SMS reminder system: Design Encryption Standard (AES) and
and implementation; 2020. Steganography," International Journal of
84. Haji SH, Ameen SY. "Attack and Anomaly Sci-entific Research in Computer Science,
Detection in IoT Networks using Machine Engineering and Information Technology
Learning Techniques: A Review," Asian (IJSRCSEIT), ISSN: 2456-3307. 2019;5:
Journal of Research in Computer Science. 317-322.
2021; 30-46. 95. Wang J, Cheng M, Wu P, Chen B. "A
85. Sadeeq MA, Zeebaree SR, Qashi R, Survey on Digital Image Steganography,"
Ahmed SH, Jacksi K. "Internet of Things Journal of Information Hiding and Privacy
security: a survey," in 2018 International Protection. 2019;1:87.
Conference on Advanced Science and 96. Emad E, Safey A, Refaat A, Osama Z,
Engineering (ICOASE). 2018;162-166. Sayed E, Mohamed E. "A secure image
86. Abdulazeez AM, Zeebaree SR, Sadeeq steganography algorithm based on least
MA. "Design and implementation of significant bit and integer wavelet
electronic student affairs system," transform," Journal of Systems
Academic Journal of Nawroz University. Engineering and Electronics. 2018;29:639-
2018;7:66-73. 649.
87. Sallow AB, Sadeeq M, Zebari RR, 97. C. Irawan, C. A. Sari, and E. H.
Abdulrazzaq MB, Mahmood MR, Shukur Rachmawanto, "Hiding and securing
HM, et al. "An investigation for mobile message on edge areas of image using
malware behavioral and detection LSB steganography and OTP encryption,"
techniques based on android platform," in 2017 1st International Conference on
IOSR Journal of Computer Engineering Informatics and Computational Sciences
(IOSR-JCE). 2020;22:14-20. (ICICoS), 2017, pp. 1-6.
88. Mohammed SM, Jacksi K, Zeebaree SR. 98. AlKhamese AY, Shabana WR, Hanafy IM.
Glove Word Embedding and DBSCAN "Data security in cloud computing using
algorithms for Semantic Document steganography: a review," in 2019
Clustering," in International Conference on International Conference on Innovative
Advanced Science and Engineering Trends in Computer Engineering (ITCE).
(ICOASE). 2020;1-6. 2019;549-558.
89. Hasan BMS, Ameen SY, Hasan OMS. 99. Ruchi R, Ghanekar U. "A Brief Review on
Image Authentication Based on Image Steganography Techniques," in
Watermarking Approach," Asian Journal of Proceedings of the International
Research in Computer Science. 2021;34- Conference on Advances in Electronics,
51. Electrical & Computational Intelligence
90. Singh PK, Tripathi P, Kumar R, Kumar D. (ICAEEC); 2019.
Secure Data Transmission," International 100. Goyal S, Nehra MS. "Image
Research Journal of Engineering and Steganography Technique to Increase
Technology. 2017;4:217-222. Security of Images: A Review; 2019.
91. Hussain M, Wahab AWA, Idris YIB, Ho AT, 101. Younus ZS, Hussain MK. "Image
Jung KH. "Image steganography in spatial steganography using exploiting
domain: A survey," Signal Processing: modification direction for compressed
Image Communication. 2018;65:46-66. encrypted data," Journal of King Saud
92. Kothari L, Thakkar R, Khara S. "Data University-Computer and Information
hiding on web using combination of Sciences; 2019.
Steganography and Cryptography," in 102. Leng HS, Tseng HW. "Generalize the EMD
2017 International Conference on scheme on an n-dimensional hypercube
Computer, Communications and with maximum payload," Multimedia Tools
Electronics (Comptelix). 2017;448-452. and Applications. 2019;78:18363-18377.
93. Reddy VL. "Improved Secure Data 103. Abduallah WM, Rahma AMS. "A review on
Transfer Using Video Steganographic steganography techniques," American
Technique," International Journal of Rough Scientific Research Journal for

50
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

Engineering, Technology, and Sciences Pixel Value Difference," in 2019 IEEE 2nd
(ASRJETS). 2016;24:131-150. International Conference on Computer and
104. Arora H, Bansal C, Dagar S. "Comparative Communication Engineering Technology
study of image steganography techniques," (CCET). 2019;6-10.
in 2018 International Conference on 115. Saha S, Chakraborty A, Chatterjee A,
Advances in Computing, Communication Dhargupta S, Ghosal SK, Sarkar R.
Control and Networking (ICACCCN), "Extended exploiting modification direction
2018;982-985. based steganography using hashed-
105. Wu X, Li J, Tu R, Cheng J, Bhatti UA, Ma weightage Array," Multimedia Tools and
J. "Contourlet-DCT based multiple robust Applications. 2020;79;20973-20993.
watermarkings for medical images," 116. Liu Y, Yang C, Sun Q. "Enhance
Multimedia Tools and Applications. embedding capacity of generalized
2019;78:8463-8480. exploiting modification directions in data
106. Zeebaree DQ, Abdulazeez AM, Hassan hiding," IEEE Access. 2017;6:5374-5378.
OMS, Zebari DA, Saeed JN. "Hiding Image 117. Elshazly E, Abdelwahab SA, Fikry R,
by Using Contourlet Transform," ed: press; Zahran O, Elaraby S, El-Kordy M. "FPGA
2020. implementation of image steganography
107. Hameed AS. "High Capacity Audio algorithms using generalized exploiting
Steganography Based on Contourlet modification direction and pixel
Transform," Tikrit Journal of Engineering segmentation strategy," in 2018 35th
Sciences. 2018;25:1-7. National Radio Science Conference
108. Cahya R, Arief P, Novriza A, Kohei A. (NRSC). 2018;258-265.
"Noble Method for Data Hiding using 118. Thanki R, Borra S. "A color image
Steganography Discrete Wavelet steganography in hybrid FRT–DWT
Transformation and Cryptography Triple domain," Journal of information security
Data Encryption Standard: DES," and applications. 2018;40:92-102.
International Journal of Advanced 119. Anwar F, Rachmawanto EH, Sari CA.
Computer Science and Applications. 2018; StegoCrypt Scheme using LSB-AES
9.
Base64," in 2019 International Conference
109. Muhuri PK, Ashraf Z, Goel S. "A novel
on Information and Communications
image steganographic method based on
Technology (ICOIACT). 2019;85-90.
integer wavelet transformation and particle
120. Rafrastara FA, Prahasiwi R, Rachmawanto
swarm optimization," Applied Soft
EH, Sari CA. "Image Steganography using
Computing. 2020;92:106257.
Inverted LSB based on 2 nd, 3 rd and 4 th
110. Latef AA. "Color Image Steganography
LSB pattern," in 2019 International
Based on Discrete Wavelet and Discrete
Conference on Information and
Cosine Transforms," Ibn AL-Haitham
Communications Technology (ICOIACT).
Journal for Pure and Applied Science.
2019;179-184.
2017; 24.
111. Subong RA, Fajardo AC, Kim YJ. "LSB 121. AlWatyan A, Mater W, Almutairi O,
Rotation and Inversion Scoring Approach Almutairi M, Al-Noori A. "Security approach
to Image Steganography," in 2018 15th for LSB steganography based FPGA
International Joint Conference on implementation," in 2017 7th International
Computer Science and Software Conference on Modeling, Simulation, and
Engineering (JCSSE). 2018;1-4. Applied Optimization (ICMSAO), 2017;1-5.
112. Elharrouss O, Almaadeed N, Al-Maadeed 122. Astuti YP, Rachmawanto EH, Sari CA.
S. "An image steganography approach "Simple and secure image steganography
based on k-least significant bits (k-LSB)," using LSB and triple XOR operation on
in 2020 IEEE International Conference on MSB," in 2018 International Conference on
Informatics, IoT, and Enabling Information and Communications
Technologies (ICIoT). 2020;131-135. Technology (ICOIACT). 2018;191-195.
113. Swain G. "Adaptive and non-adaptive PVD 123. Maji G, Mandal S, Debnath NC, Sen S.
steganography using overlapped pixel Pixel value difference based image
blocks," Arabian Journal for Science and steganography with one time pad
Engineering. 2018;43:7549-7562. encryption," in 2019 IEEE 17th
114. Zhou L, Cao Y. "Combined Algorithm of International Conference on Industrial
Steganography with Matrix Pattern and Informatics (INDIN). 2019;1358-1363.

51
Abdullah et al.; AJRCOS, 10(3): 33-52, 2021; Article no.AJRCOS.70381

124. Saleh F, Amirmazlaghani M. "A Novel 131. Subhedar MS, Mankar VH. "Image
Multiplicative Steganography Technique in steganography using contourlet transform
Contourlet Domain," in 2017 14th and matrix decomposition techniques,"
International ISC (Iranian Society of Multimedia Tools and Applications.
Cryptology) Conference on Information 2019;78:22155-22181.
Security and Cryptology (ISCISC). 2017; 132. Giri KJ, Bashir R. "A block based
105-110. watermarking approach for color images
125. Reshma V, Kumar RV, Shahi D, Shyjith M. using discrete wavelet transformation,"
Optimized support vector neural network International Journal of Information
and contourlet transform for image Technology. 2018;10:139-146.
steganography," Evolutionary Intelligence. 133. Rabie T, Baziyad M, Kamel I. "Enhanced
2020;1-17. high capacity image steganography using
126. Nevriyanto A, Sutarno S, Siswanti SD, discrete wavelet transform and the
Erwin E. "Image steganography using Laplacian pyramid," Multimedia Tools and
combine of discrete wavelet transform and Applications. 2018;77:23673-23698.
singular value decomposition for more 134. Abdel Qader A. A novel image
robustness and higher peak signal noise steganography approach using multi-layers
ratio," in 2018 International Conference on DCT features based on support vector
Electrical Engineering and Computer machine classifier," The International
Science (ICECOS). 2018;147-152. Journal of Multimedia & Its Applications
(IJMA). 2017;9.
127. Kukharska N, Lagun A, Polotai O. "The
135. Murugan GVK, Subramaniyam RU.
Steganographic Approach to Data
"Performance analysis of image
Protection Using Arnold Algorithm and the
steganography using wavelet transform for
Pixel-Value Differencing Method," in 2020
safe and secured transaction," Multimedia
IEEE Third International Conference on
Tools and Applications. 2019;1-15.
Data Stream Mining & Processing
136. Zhang X, Peng F, Long M. "Robust
(DSMP). 2020;174-177.
coverless image steganography based on
128. Shehab JN, Abdulkadhim HA, Allbadi Y. DCT and LDA topic classification," IEEE
Blind image watermarking scheme based Transactions on Multimedia. 2018;20:
on lowest energy contourlet transform 3223-3238.
coefficient and modified arnold cat/ikeda 137. Arunkumar S, Subramaniyaswamy V,
maps," Indonesian Journal of Electrical Vijayakumar V, Chilamkurti N, Logesh R.
Engineering and Computer Science. SVD-based robust image steganographic
2021;21:196-207. scheme using RIWT and DCT for secure
129. Li JY, Zhang CZ. "Blind watermarking transmission of medical images,"
scheme based on Schur decomposition Measurement. 2019;139:426-437.
and non-subsampled contourlet 138. Kaur R, Singh B. "A hybrid algorithm for
transform," Multimedia Tools and robust image steganography,"
Applications. 2020; 79:30007-30021. Multidimensional Systems and Signal
130. Najafi E, Loukhaoukha K. "Hybrid secure Processing. 2021;32:1-23.
and robust image watermarking scheme 139. Qu Z, Cheng Z, Liu W, Wang X. "A novel
based on SVD and sharp frequency quantum image steganography algorithm
localized contourlet transform," Journal of based on exploiting modification direction,"
information security and applications. Multimedia Tools and Applications. 2019;
2019;44:144-156. 78:7981-8001.
_________________________________________________________________________________
© 2021 Abdullah et al.; sThis is an Open Access article distributed under the terms of the Creative Commons Attribution
License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any
medium, provided the original work is properly cited.

Peer-review history:
The peer review history for this paper can be accessed here:
http://www.sdiarticle4.com/review-history/70381

52

View publication stats

You might also like