<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enhancing the steganographic resistance of hidden information to active attacks ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yurii</forename><surname>Yaremchuk</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<addrLine>95 Khmelnytsky Highway str</addrLine>
									<postCode>21000</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olha</forename><surname>Saliieva</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<addrLine>95 Khmelnytsky Highway str</addrLine>
									<postCode>21000</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vasyl</forename><surname>Karpinets</surname></persName>
							<email>karpinets@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<addrLine>95 Khmelnytsky Highway str</addrLine>
									<postCode>21000</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Nikolaienko</surname></persName>
							<email>andrey.nikolaienko.0@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Vinnytsia National Technical University</orgName>
								<address>
									<addrLine>95 Khmelnytsky Highway str</addrLine>
									<postCode>21000</postCode>
									<settlement>Vinnytsia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nataliia</forename><surname>Kunanets</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enhancing the steganographic resistance of hidden information to active attacks ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">D060CC740914E0CE0FB926D8D29655DB</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:50+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>steganography</term>
					<term>concealment of information</term>
					<term>steganalysis</term>
					<term>active attack</term>
					<term>color gamut 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>With the rapid development of modern information technologies and systems, the number and complexity of threats aimed at breaching the security of confidential information transmitted secretly in multimedia files is increasing. At the same time, active attacks aimed at steganographic information protection systems are of great importance, as they differ from passive attacks in that the attacker not only tries to detect hidden information but can also modify the image to remove or distort it. Given the importance of this issue, the paper proposes to increase the resistance of hidden information in images to color gamutchanging attacks. To achieve this goal, the hiding algorithm has been improved based on the use of matrix filters to find the most suitable image areas and hide bits of information in them by correlating the average brightness of segments in blocks. The proposed algorithm includes many variable parameters, which makes it possible to adapt it to a wide range of images. In addition, flexible parameter settings enable improved information embedding and extraction accuracy. To validate the effectiveness of the enhanced algorithm, color-change attacks were conducted on an image containing embedded hidden information. Various steganalysis methods were also applied, including visual steganalysis, which reveals the least significant bit of the image; RS steganalysis, which estimates the approximate size of the hidden data; and a method analyzing the distribution of image elements on a plane to detect patterns, structures, or anomalies within the image. The obtained results demonstrate the robustness of the proposed method of information hiding to the selected steganalysis algorithms and to color gamut-changing attacks.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>With the rapid advancement of technology and communications, it is becoming increasingly important to protect confidential information from unauthorized access. After all, transmitting a secret message over an unprotected network channel poses a serious threat to its security. Among the methods for solving this problem are steganographic methods, which involve the open transport of a secret message embedded in a container in advance <ref type="bibr" target="#b0">[1]</ref>. However, there are many attacks aimed at breaking into steganographic systems, including attacks that focus on changing the color gamut in images, which can lead to the disclosure of hidden information, violation of its confidentiality and integrity. Therefore, this paper presents a study related to increasing the resistance of hidden information in images to these attacks. Thus, in this paper, based on the analysis of known steganographic methods, it is necessary to improve the algorithm for hiding information using matrix filters and test it to prove its resistance to steganalysis and color change attacks.</p><p>In recent years, numerous studies have been conducted on methods of hiding data in images based on the use of algorithms for finding acceptable zones for hiding information. For example, in their study <ref type="bibr" target="#b1">[2]</ref>, the authors developed the Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption (BESOPS-CE) steganographic image method based on the method of searching for optimal pixels with chaotic encryption. The presented method effectively hides the secret image in encrypted form under the cover image. In this paper <ref type="bibr" target="#b2">[3]</ref>, a steganographic scheme based on graph wavelet transformation using graph signal processing (GSP) is proposed, which improves the visual quality of a stego image. The authors of the paper <ref type="bibr" target="#b3">[4]</ref> presented a new steganographic approach in which the algorithm of an extreme learning machine is modified to create a supervised mathematical model. This algorithm is first trained on a part of the image and then tested in regression mode, which allows choosing the optimal place to embed a message with the best values of the predicted evaluation metrics. In this research <ref type="bibr" target="#b4">[5]</ref>, a new method was proposed to increase the possibility of embedding secret information in an image based on the edge region. The new approach combines the Kenny and Pruitt edge detection methods using a binary operation, and the secret message is hidden using the least significant bit (LSB) method.</p><p>An interesting idea is that of the authors of that paper <ref type="bibr" target="#b5">[6]</ref>, who proposed an algorithm for encrypting private images in combination with a new tent multi-dynamic piecewise connected mapping lattice (TMDPCML) for spatiotemporal chaotic systems. This algorithm extracts private image information and uses distributed nonlinear diffusion. Study <ref type="bibr" target="#b6">[7]</ref> presents a method for detecting steganographic changes in images using convolutional neural networks. In <ref type="bibr" target="#b7">[8]</ref>, a new stenographic swarm optimization technique with encryption for digital image protection, called CSOES-DIS, was developed. The proposed model applies the method of double chaotic digital image encryption, and then the embedding process is implemented. The authors of this paper <ref type="bibr" target="#b8">[9]</ref> proposed a new algorithm for encrypting and hiding triple images by combining a 2D chaotic system, compressive sensing (CS), and 3D discrete cosine transform (DCT).</p><p>Data hiding methods that use areas of rapid changes in an image to hide information have many advantages, including high capacity, adaptability to different types of images and data formats, and the ability to use both the spatial and frequency characteristics of an image. However, these methods are not very resistant to color gamut attacks, which limits their effectiveness. In this regard, the paper proposes an improvement that uses luminance correlation and matrix filters to effectively hide information in images while providing a high level of protection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Main body</head><p>Most algorithms that use areas of rapid changes in the image to hide information use the method of hiding information in one or two last bits of pixels of different channels. These methods are called LSB and 2-LSB according to the number of least significant bits <ref type="bibr" target="#b9">[10]</ref>. However, these algorithms cannot withstand color gamut attacks, so it is worth improving an algorithm that will use luminance correlation to embed bits of information in the image, which will help to withstand color gamut attacks by using luminance in areas that are most difficult to change.</p><p>To increase the resistance to the above attacks, it is proposed to use matrix filters to detect areas of sharp transitions, which are expressed in the red and green channels, while information is hidden in the blue channel.</p><p>The proposed algorithm applies a filter using the discrete Laplace operator <ref type="bibr" target="#b10">[11]</ref>, which can be represented in two forms:</p><p>𝛻 𝑓 = 𝑓(𝑖 + 1, 𝑗) + 𝑓(𝑖 − 1, 𝑗) + +𝑓(𝑖, 𝑗 + 1) + 𝑓(𝑖, 𝑗 − 1) − 4 * 𝑓(𝑖, 𝑗),</p><p>(1)</p><formula xml:id="formula_0">0 1 0 1 −4 1 0 1 0 ,<label>(2)</label></formula><p>where 𝑖, 𝑗 are indices in the cell of the selected pixel to determine ∇ 𝑓.</p><p>The next stage of the algorithm is to divide the resulting matrix 𝑀 and image 𝑃 into blocks of size 𝑛 х 𝑛, with the number of blocks being 𝑟. For each block of the matrix 𝑀 a set of pixel indices is defined by 𝑁 , exceeding the threshold value. This process begins by calculating the average value between the blocks:</p><formula xml:id="formula_1">ℎ (𝑥, 𝑦) = 𝑟𝑚 (𝑥, 𝑦) + 𝑔𝑚 (𝑥, 𝑦) 2 , 𝑖 = 1 … 𝑟, 𝑥 = 1 … 𝑛, 𝑦 = 1 … 𝑛,<label>(3)</label></formula><p>where ℎ is i th block with the average value between the pixels of the blocks; 𝑟𝑚 is i th block from the red channel of the matrix 𝑀; 𝑔𝑚 is i th block from the green channel of the matrix 𝑀; 𝑛 is the size of the block.</p><p>Next, the set of indices is defined as follows 𝑁 : </p><formula xml:id="formula_2">𝑁 = {(𝑥, 𝑦)|ℎ (𝑥, 𝑦) &gt; 𝑇},<label>(4)</label></formula><formula xml:id="formula_3">𝐷 = {𝑁 [𝑗]|𝑁 [𝑗][1] &gt; 𝑛 2 , 𝑗 = 1 … 𝑛 },<label>(5)</label></formula><formula xml:id="formula_4">𝑇 = {𝑁 [𝑗]|𝑁 [𝑗][1] ≤ 𝑛 2 , 𝑗 = 1 … 𝑛 },<label>(6)</label></formula><p>where The last stage of preparation before embedding the information is to calculate the average brightness of the pixels in the blue channel of the image 𝑃 for the pixels with the lower and upper block indices:</p><formula xml:id="formula_5">𝑝𝑑 = ∑ 𝑏𝑝 (𝐷 [𝑗]) 𝑑 ,<label>(7)</label></formula><formula xml:id="formula_6">𝑝𝑡 = ∑ 𝑏𝑝 (𝑇 [𝑗]) 𝑡 ,<label>(8)</label></formula><p>where Thus, the preparation stage for hiding information in the image takes place.</p><p>Next, the embedding process is examined. Assuming a sequence of bits W exists, to hide one bit of information, the average brightness of the pixels at the calculated indices in the lower and upper parts of the blue channel block of the image must satisfy the conditions for embedding the bit. Moreover, the smaller the embedding dimension, the more intensively the pixel brightness will change, and vice versa.</p><p>Example of conditions for hiding a single bit: At the same time, the conditions for hiding the zero bit will be as follows: If the condition for hiding a bit of information is not met, the total brightness is correlated by increasing or decreasing by a unit block of pixels whose indices belong to the lower or upper threshold of the blue channel block. This happens until the conditions for hiding the selected bit of information are met. This is how information in the image is hidden.</p><formula xml:id="formula_7">𝑖𝑓 𝑤 =</formula><p>We will develop algorithms that implement an improved method of hiding information.</p><p>Fig. <ref type="figure" target="#fig_4">1</ref> shows a general algorithm for embedding one bit of information in one block.</p><p>After determining the luminance values, a check is performed to determine whether the bit has been embedded. If this condition is not met, then the correlation value for the lower and upper parts of the block is calculated, then the brightness for these parts of the block is correlated and the brightness value is calculated. This process is repeated cyclically until the desired values are selected and the condition is fully met.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Experimental research</head><p>The security of the proposed algorithm was analyzed by performing color change attacks on the image in which the hidden information was embedded.</p><p>To determine the effectiveness of the algorithm's protection against such attacks, the values of 𝑚 , are calculated, reflecting the correspondence between the embedded hidden information 𝑤 and the extracted hidden information 𝑤 * obtained:</p><formula xml:id="formula_8">𝑚 = 𝑛 𝑀 100%,<label>(9)</label></formula><p>where 𝑛 is the number of equal bits in both messages; 𝑀 is the size of the hidden message in bits.</p><p>Value of 𝑚 indicates the success of extracting hidden information from the image.</p><p>More than 100 different images were selected for the experiment, most of which are detailed full-color images with a sufficient number of contrast transitions and monotonous areas.</p><p>Fig. <ref type="figure">3</ref> shows an example of one of the images after attacks that altered the color scheme: making it brighter, more contrasted, and darker, closer to grayscale.</p><p>Figure <ref type="figure">3</ref>: Images with hidden information after attacks: change of color scheme to brighter, more contrasty, and darker, to shades of grey Let's examine the impact of color gamut attacks on images with an embedded message (Table <ref type="table">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>The result of calculating the value 𝑚 for an image that is under attack Attack 𝑚 Change the color scheme to a brighter one 98,223 Change the color scheme to a more contrasting and darker one 92,164</p><p>Change the color scheme to shades of grey 84,857</p><p>After analyzing the data obtained, it can be concluded that when the color gamut shifts toward grey, the percentage of lost data in the image increases; however, the algorithm remains quite resistant to this attack. Next, a visual method will be tested that shows the most significant bit of the image. The test result is shown in Fig. <ref type="figure" target="#fig_6">4</ref>, with the results from the original image displayed on the left and the modified image on the right. After analyzing the data, it can be concluded that the least significant bits from the original image differ significantly from those of the container image; however, the container does not exhibit significant distortions or artifacts that would indicate the presence of hidden data.</p><p>The following testing will be carried out using the RS steganalysis method, which is effective for detecting the presence of a message in an image and estimating the approximate size of the hidden data. The results of the method on the original image are shown in Fig. <ref type="figure" target="#fig_7">5</ref>, and on the modified image-in Fig. <ref type="figure" target="#fig_8">6</ref>.  Let's conduct additional testing of the algorithm, focusing on the analysis of the distribution of image elements on the plane (Fig. <ref type="figure">7</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 7:</head><p>The result of steganalysis using the method of analyzing the distribution of image elements on the plane If the points are randomly distributed over the entire area, the sequence elements are independent, which is typical for containers with embedded data. If the container is not filled, then an uneven distribution of points on the field will be observed. Since the container did not show a chaotic arrangement of points, this method was unable to recognize that the container contained hidden information.</p><p>Thus, according to the results of the study, it can be assumed that the proposed method of hiding information is resistant to the described steganalysis algorithms and to color change attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>In this work, the information-hiding algorithm is improved by using matrix filters to identify the most suitable areas in the image and embed information bits into them. This is achieved by varying the brightness of segments in image blocks, which are consistently changed to hide bits of information. The main feature of the proposed algorithm is its high resistance to color gamut attacks, achieved by embedding bits by changing the average brightness of the selected hiding zones. Due to the large number of variable parameters, another significant advantage of the improved algorithm can be identified, namely the flexibility of settings, which allows the algorithm to be adapted to different types of images.</p><p>In addition, the study presents the algorithm of the program in the form of flowcharts, which is an important step in testing the improved algorithm for resistance to active attacks. The results of the testing indicate high resistance to color gamut attacks on bright colors and above-average resistance to grey gamut attacks. Also, during the testing, resistance to steganalysis by visual methods, RS method, and the method of analyzing the distribution of the image on the plane was revealed.</p><p>Thus, based on the proposed improvement of the algorithm, the steganographic resistance of hidden information in images to active attacks was increased.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>𝐷 = {(𝑥 , 𝑦 ), (𝑥 , 𝑦 ), … , (𝑥 , 𝑦 )}, 𝑘 = 1 … 𝑑 -is the set of lowercase indices of the part of the block from 𝑁 ; 𝑇 = {(𝑥 , 𝑦 ), (𝑥 , 𝑦 ), … , (𝑥 , 𝑦 )}, 𝑘 = 1 … 𝑡 is the set of upper indices of the part of the block from 𝑁 ; 𝑁 [𝑗] is value 𝑥 , 𝑦 from і th block, and 𝑁 [𝑗] [1] is value of 𝑥 from the set of indices from 𝑁 і th block.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>𝑝𝑑 is the average brightness of the lower part of the іth block by indices 𝐷 ; 𝑝𝑡 is the average brightness of the upper part of the і th block by indices 𝑇 ; 𝐷 [𝑗] is indices 𝑥 , 𝑦 of the lower part of the і th block; 𝑇 [𝑗] is indices 𝑥 , 𝑦 the upper part of the і th block; 𝑏𝑝 is a block from the blue image channel P, accordingly 𝑏𝑝 (𝐷 [𝑗]) and 𝑏𝑝 (𝑇 [𝑗]) are pixels from the top and bottom part of і-th block for the specified indices 𝑇 [𝑗] and 𝐷 [𝑗].</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>1, (0 * 𝛿) + 𝜀 ≤ 𝑝𝑑 ≤ (0 + 1) * 𝛿 − 𝜀 ∨, (2 * 𝛿) + 𝜀 ≤ 𝑝𝑑 ≤ (2 + 1) * 𝛿 − 𝜀 ∨ … ∨, (𝑐 * 𝛿) + 𝜀 ≤ 𝑝𝑑 ≤ (𝑐 + 1) * 𝛿 − 𝜀 ∧, (1 * 𝛿) + 𝜀 ≤ 𝑝𝑡 ≤ (1 + 1) * 𝛿 − 𝜀 ∨, (3 * 𝛿) + 𝜀 ≤ 𝑝𝑡 ≤ ((3 + 1) * 𝛿) − 𝜀 ∨ … ∨, (𝑣 * 𝛿) + 𝜀 ≤ 𝑝𝑡 ≤ (𝑣 + 1) * 𝛿 − 𝜀 , 𝑣 = 1, 3, 5 … 𝑞 − 1, 𝑐 = 0, 2, 4 … 𝑞 − 2, 𝛿 = , where 𝑞 is embedding dimension; 𝜀 is brightness change coefficient (0 &lt; 𝜀 &lt; ).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>𝑖𝑓 𝑤 = 0, (0 * 𝛿) + 𝜀 ≤ 𝑝𝑡 ≤ (0 + 1) * 𝛿 − 𝜀 ∨, (2 * 𝛿) + 𝜀 ≤ 𝑝𝑡 ≤ (2 + 1) * 𝛿 − 𝜀 ∨ … ∨, (𝑐 * 𝛿) + 𝜀 ≤ 𝑝𝑡 ≤ (𝑐 + 1) * 𝛿 − 𝜀 ∧, (1 * 𝛿) + 𝜀 ≤ 𝑝𝑑 ≤ (1 + 1) * 𝛿 − 𝜀 ∨, (3 * 𝛿) + 𝜀 ≤ 𝑝𝑑 ≤ ((3 + 1) * 𝛿) − 𝜀 ∨ … ∨, (𝑣 * 𝛿) + 𝜀 ≤ 𝑝𝑑 ≤ (𝑣 + 1) * 𝛿 − 𝜀 , 𝑣 = 1, 3, 5 … 𝑞 − 1, 𝑐 = 0, 2, 4 … 𝑞 − 2, 𝛿 = .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Flowchart with a general algorithm for hiding one bit per block At the same time, the general algorithm for extracting a bit of information from a block is shown in Fig. 2.</figDesc><graphic coords="3,310.80,128.88,206.40,306.00" type="vector_box" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Flowchart with a general algorithm for extracting a bit of information</figDesc><graphic coords="3,141.60,502.08,311.76,254.16" type="vector_box" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Comparison of the least significant bits in the original and hidden images</figDesc><graphic coords="4,71.76,488.64,451.92,157.44" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: The result of steganalysis of the original image using the RS method</figDesc><graphic coords="5,126.96,71.76,340.56,74.16" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: The result of steganalysis of a modified image using the RS method Thus, minor changes in different image channels were detected, but these values cannot indicate the presence or absence of hidden information in the container or the original.Let's conduct additional testing of the algorithm, focusing on the analysis of the distribution of image elements on the plane (Fig.7).</figDesc><graphic coords="5,126.96,166.80,340.56,74.16" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>where 𝑇 is threshold value. 𝑁 = {(𝑥 , 𝑦 ), (𝑥 , 𝑦 ), … , (𝑥 , 𝑦 )}, 𝑘 = 1 … 𝑛 ; 𝑛 is the length of the i th variable 𝑁 . The next step is to split 𝑁 into indices corresponding to the lower and upper parts of the block:</figDesc><table /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Improvement of Steganographic Methods based on the Analysis of Image Color Models</title>
		<author>
			<persName><forename type="first">S</forename><surname>Buchyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Cybersecurity Providing in Information and Telecommunication Systems</title>
				<imprint>
			<publisher>CPITS</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2923</biblScope>
			<biblScope unit="page" from="117" to="124" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Image Steganography Technique based on Bald Eagle Search Optimal Pixel Selection with Chaotic Encryption</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bahaddad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Almarhabi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Abdel-Khalek</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.aej.2023.05.051</idno>
	</analytic>
	<monogr>
		<title level="j">Alexandria Eng. J</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="41" to="54" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Efficient Image Steganography using Graph Signal Processing</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">K</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Srivastava</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mathur</surname></persName>
		</author>
		<idno type="DOI">10.1049/iet-ipr.2017.0965</idno>
	</analytic>
	<monogr>
		<title level="j">IET Image Process</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1065" to="1071" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Extreme Learning Machine based Optimal Embedding Location Finder for Image Steganography</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Atee</surname></persName>
		</author>
		<idno type="DOI">10.1371/journal.pone.0170329</idno>
	</analytic>
	<monogr>
		<title level="j">PLoS ONE</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Mohsin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Alameen</surname></persName>
		</author>
		<idno type="DOI">10.2478/cait-2021-0032</idno>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Information Technologies</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="97" to="107" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A Privacy Image Encryption Algorithm based on Piecewise Coupled Map Lattice with Multi Dynamic Coupling Coefficient</title>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yang</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ins.2021.04.013</idno>
	</analytic>
	<monogr>
		<title level="j">Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">569</biblScope>
			<biblScope unit="page" from="217" to="240" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Method for Detecting Steganographic Changes in Images using Machine Learning</title>
		<author>
			<persName><forename type="first">D</forename><surname>Denysiuk</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT61349.2023.10416453</idno>
	</analytic>
	<monogr>
		<title level="m">13 th International Conference on Dependable Systems, Services and Technologies (DESSERT)</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Competitive Swarm Optimization with Encryption based Steganography for Digital Image Security</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Eshmawi</surname></persName>
		</author>
		<idno type="DOI">10.32604/cmc.2022.028008</idno>
	</analytic>
	<monogr>
		<title level="j">Comput. Mater. Contin</title>
		<imprint>
			<biblScope unit="volume">72</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="4173" to="4184" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A Novel Triple-Image Encryption and Hiding Algorithm based on Chaos, Compressive Sensing and 3D DCT</title>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Jiang</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ins.2021.06.032</idno>
	</analytic>
	<monogr>
		<title level="j">Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">574</biblScope>
			<biblScope unit="page" from="505" to="527" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Tarigan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Putra</surname></persName>
		</author>
		<idno type="DOI">10.1088/1742-6596/1898/1/012003</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Physics: Conference Series</title>
		<imprint>
			<biblScope unit="volume">1898</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="https://hilbert-cantor.medium.com/discrete-laplacian-8a5dde7ff001" />
		<title level="m">Discrete Laplacian</title>
				<imprint>
			<publisher>Medium</publisher>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
