<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>High-Capacity Spatial Steganography Based on Perfect Binary Arrays⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Artem Sokolov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Denys Yevdokymov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Fraze-Frazenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National University “Odesa Law Academy”</institution>
          ,
          <addr-line>Fontanska Road, 23, Odesa</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Odesa I.I. Mechnikov National University</institution>
          ,
          <addr-line>Vsevolod Zmienko Street, 2, Odesa</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>We propose a fundamentally new steganographic approach based on perfect binary arrays - twodimensional algebraic structures with ideal 2D periodic autocorrelation properties. The method operates in the spatial domain and utilizes the symmetry of perfect binary arrays under cyclic shifts and inversion to encode information with mathematically guaranteed control over signal perturbation. By assigning each message fragment to a specific transformation from a set of 2N 2 possible states (where N is the block size), the method enables flexible, high-capacity embedding: for instance, up to 7 bits per 8 8 block, which exceeds the capacity of classical code-controlled schemes by a factor of seven. We derive general modulation and decoding formulas, rigorously analyze perceptual impact, and demonstrate that pixel modifications are limited to ±1, resulting in PSNR values above 48 dB even at 100% embedding density. Moreover, the method shows resilience under JPEG compression, maintaining message integrity at low compression levels. These results highlight the potential of algebraic structures such as perfect binary arrays not only to redefine payload capacity limits but also to inspire a shift in steganographic design toward structured, high-order embedding, as originally envisioned in Shannon's coding theory.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;steganography</kwd>
        <kwd>perfect binary arrays</kwd>
        <kwd>code-controlled embedding</kwd>
        <kwd>spatial domain</kwd>
        <kwd>autocorrelation</kwd>
        <kwd>cyclic shift</kwd>
        <kwd>embedding capacity</kwd>
        <kwd>information security</kwd>
        <kwd>JPEG compression</kwd>
        <kwd>Shannon's theory 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Recent advances in image steganography have introduced a variety of techniques aimed at
improving payload capacity, imperceptibility, and robustness. Vakani et al. [1] proposed a novel
“DCT-in-DCT” scheme that enhances the quality of payload extraction by embedding data within
nested DCT domains. Sabeti and Aghabagheri [2] developed an adaptive DCT-based method
employing a genetic algorithm to dynamically optimize embedding, achieving a favorable balance
between capacity and distortion. Kaur and Singh [3] introduced an n-ary steganographic approach
in the DCT domain that leverages chaotic maps to enhance both robustness and visual quality. In
another contribution, Sahu and Pradhan [4] integrated AES encryption into a DCT-based framework,
increasing security without significantly degrading image fidelity. Liu et al. [5] proposed a method
combining wavelet-domain SVD and adaptive QIM for JPEG image steganography, resulting in
improved resistance to compression attacks. Similarly, Pramanik [6] utilized integer wavelet
transform and genetic algorithms to adaptively control embedding locations, thus enhancing
imperceptibility. Ahmad et al. [7] explored a CNN-DCT hybrid model that applies deep learning for
steganographic embedding over cloud systems, maintaining high visual fidelity. Ray et al. [8] applied
edge detection via deep learning to identify perceptually insensitive embedding regions, improving
both security and transparency. Hassaballah et al. [9] addressed steganography in the context of
Industrial Internet of Things by proposing a lightweight, secure method suitable for
resourceconstrained environments. Finally, Meenadshi et al. [10] introduced an AI-enhanced LSB framework
that leverages machine learning to optimize concealed data embedding, offering improvements in
both embedding efficiency and concealment quality. These developments highlight the ongoing
trend toward adaptive, transformation-domain, and AI-driven steganographic solutions tailored for
diverse application scenarios.</p>
      <p>However, these transformations are computationally intensive, making such methods unsuitable
for resource-constrained environments, such as Internet of Things devices, where memory and
processing power are severely limited. This limitation motivates the exploration of alternative
approaches that combine mathematical rigor with low computational complexity.</p>
      <p>A breakthrough in this context has been achieved by code-controlled steganographic methods,
which operate directly in the spatial domain of the cover medium while preserving precise control
over the desired frequency components [11]. Unlike traditional transform-based techniques, these
methods leverage structured code constructions to guide the embedding process in a way that
ensures both low computational overhead and predictable spectral characteristics of the resulting
steganographic message. By avoiding explicit transformations, code-controlled methods
significantly reduce the complexity of embedding and extraction procedures, making them
particularly attractive for deployment on lightweight or embedded platforms. Moreover, they open
new avenues for achieving fine-grained trade-offs between imperceptibility, robustness, and
security.</p>
      <p>Existing code-controlled steganographic methods often rely on Walsh functions as codewords,
taking advantage of their orthogonality and binary nature to selectively affect specific transform
coefficients in the Walsh-Hadamard domain. This selective modulation enables controlled
manipulation of particular frequency components within the spatial domain, without performing an
explicit transform. However, such approaches typically embed only one bit of information per block,
which significantly limits the embedding capacity. In applications where capacity is a critical
requirement, such as covert communication or high-volume data hiding, this limitation becomes a
significant drawback. To address this, we propose a novel approach based on perfect binary arrays
— well-structured algebraic constructions that allow for efficient partitioning of the embedding
space. We show that equivalence classes of perfect binary arrays enable the embedding of one bit of
information per pixel, drastically increasing capacity while maintaining control over the signal’s
spectral properties and preserving computational efficiency.</p>
      <p>The purpose of this paper is to develop and justify a conceptual framework for a high-capacity,
code-controlled steganographic method based on perfect binary arrays.</p>
      <p>The proposed approach is designed to operate in the spatial domain while ensuring selective
control over frequency characteristics through structured algebraic encoding. By leveraging the
inherent properties of perfect binary arrays, the concept of the steganographic method aims to
significantly increase embedding capacity — up to log2(2N 2) bit per pixel — without sacrificing the
possibility of code control or computational efficiency, where N is the order of the perfect binary
array. This work focuses on the theoretical foundations and structural principles of the method,
laying the groundwork for future practical implementations and performance evaluation.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Theoretical foundations</title>
      <p>Let us briefly consider the basic idea of the concept of code-controlled information embedding. Let
X to be the matrix of the container block of size N N . The Walsh-Hadamard transform for X
can be calculated according to the following formula
where H N is the normalized Walsh-Hadamard matrix of order N = 2k , H N is determined as
H N = (1 /N )H N , and H N is constructed following the Sylvester construction</p>
      <p>On the other hand, the transform vector V of the one-dimensional Walsh-Hadamard transform
of a vector Y of length N is determined by the following relation</p>
      <p>One of the theoretical achievements underlying the concept of code-controlled information
embedding is the relationship between the two-dimensional and one-dimensional Walsh-Hadamard
transforms [12], which can be written (with an accuracy to the coefficient 1 N ) using the operator
A, which defines the writing of the matrix A of size N N in the form of a row vector of length
N 2 by sequential concatenation of the rows of the original matrix A</p>
      <p>W =H N XH NT ,
H 2k −1
H 2k = 
H 2k −1</p>
      <p>−HH2k2k−1−1  , H 1 = 1 .</p>
      <p>V =YH N .</p>
      <p>W= XH N 2 .</p>
      <p>~ ~ ~</p>
      <p>M = X +T .</p>
      <p>Let d to be the bit of the additional information, which should be embedded in the given image
block. In correspondence with this bit, a codeword T of size N N is placed, by means of which
the bit d is embedded.</p>
      <p>
        Then the block of the steganographic message M , will have the form
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
~
Let us consider the Walsh-Hadamard transform of a row vector M
      </p>
      <p>~ ~ ~ ~ ~ ~</p>
      <p>W = M H N 2 = (X +T )H N 2 = X H N 2 +T H N 2 .</p>
      <p>
        Expression (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) allows us to make a fundamental conclusion about the nature of the perturbation
of Walsh-Hadamard transformants in the steganographic message after additive embedding of the
additional information into it. The magnitude and localization of such perturbations will depend on
~
the specific type of term T H N 2 , which represents the Walsh-Hadamard transformants for the row
~
vector T , with the help of which the additional information bit d is encoded.
      </p>
      <p>The N N matrix representation of the Walsh functions of length N 2 has been widely employed
in code-controlled steganographic schemes as codewords due to their ability to influence specific
frequency components in the Walsh-Hadamard transform domain. When used in the spatial domain,
these functions enable selective spectral shaping of the modified image blocks, allowing the
embedding process to target certain frequency bands. This property is particularly useful for
maintaining resisting attacks against the embedded message.</p>
      <p>
        For example, let us consider the codeword T 8,(
        <xref ref-type="bibr" rid="ref1 ref5">5,1</xref>
        ) targeting (
        <xref ref-type="bibr" rid="ref1 ref5">5,1</xref>
        ) Walsh-Hadamard transformant
and its Walsh-Hadamard transform (assuming 1-based indexing)
 1 1 1 1 1 1 1 1   0 0 0 0 0 0 0 0
 1 1 1 1 1 1 1 1   0 0 0 0 0 0 0 0
   
 1 1 1 1 1 1 1 1   0 0 0 0 0 0 0 0
 1 1 1 1 1 1 1 1   0 0 0 0 0 0 0 0
T8,(
        <xref ref-type="bibr" rid="ref1 ref5">5,1</xref>
        ) = −1 −1 −1 −1 −1 −1 −1 −1 , WT8,(
        <xref ref-type="bibr" rid="ref1 ref5">5,1</xref>
        ) = 64 0 0 0 0 0 0 0 .
      </p>
      <p>−1 −1 −1 −1 −1 −1 −1 −1  0 0 0 0 0 0 0 0
−1 −1 −1 −1 −1 −1 −1 −1  0 0 0 0 0 0 0 0
−1 −1 −1 −1 −1 −1 −1 −1  0 0 0 0 0 0 0 0</p>
      <p>
        However, due to their rigid structure and block-wise application, Walsh-based embedding
schemes typically offer limited capacity, motivating the search for more flexible algebraic
frameworks such as perfect binary arrays.
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
Definition 1 [13]. A perfect binary array is a two-dimensional sequence (matrix)
      </p>
      <p>H (N ) = hi ,j , i , j = 0,1,...,N − 1, hi ,j {−1,1} ,
having an ideal two-dimensional periodic autocorrelation function (2DPACF), whose elements</p>
      <p>R (m ,n ) = PACF (m ,n ) = Ni =−01Nj =−01hi ,jhi +m ,j +n = 0, fNor2a,nfoyrotmher=mn =an0d; n ,
where m,n = 0,1,...,N − 1 , and all indices of elements hi +m ,j + are reduced modulo N .</p>
      <p>Let us give as an example a perfect binary array of order N = 8 as well as its two-dimensional
periodic autocorrelation function</p>
      <p>
        Statement 1 [14]. Each perfect binary array of order N generates an E(N)-class of equivalent
matrices — perfect binary arrays by operations of cyclic shift on rows and columns and inversion,
while the cardinality of the class of equivalent matrices is
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
      </p>
      <p>J E (N ) = 2N 2 .</p>
      <p>From the research [14], the following is known. If an arbitrary generating perfect binary array
A0 (N ) of order N is given, then all its cyclic shifts are defined as Lk1AQk 2 , k 1,k 2 = 0,1,...,N − 1
and let the two-dimensional periodic cross-correlation function (2DPСCF) between A0 (N ) and its
cyclically shifted array be defined by the relation</p>
      <p>N −1N −1
B (m ,n ) = A0 (N ) **Lk1A0 (N )Qk2 =  hi ,jhi +m ,j + ,
i =0 j =0
where the symbol ** denotes a two-dimensional correlation (convolution); m,n = 0,1,...,N − 1 .</p>
      <p>The following statement is known:</p>
      <p>Statement 2 [14]. The 2DPCCF B (m ,n ) of an array A0 (N ) and array Lk1A0 (N )Qk2 of order N
, k 1,k 2 = 0,1,...,N − 1 , is a 2DPACF R (m ,n ) of an array A0 (N ) shifted by k 1 rows and k 2
columns, i.e.</p>
      <p>
        B (m ,n ) =R (m +k 1,n +k 2), m ,n = 0,1,...,N − 1.
(
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
      </p>
      <p>The core of the proposed steganographic method is based on an information modulation principle
that exploits a key property of perfect binary arrays: the 2DPCCF between a perfect binary array and
its cyclically shifted version (in rows or columns) is structurally equivalent to the corresponding
cyclic shift of the 2DPACF of the original array. This algebraic symmetry enables precise and
predictable manipulation of correlation peaks. We propose to encode information by selecting one
of 2N 2 possible states, through controlled cyclic shifts (either along rows or columns) combined
with optional binary inversion. The embedding process thus corresponds to a particular
transformation of the array structure within an image block. During extraction, the method relies on
non-blind decoding, typical for code-controlled schemes: the cover component is reconstructed, the
2DPCCF is computed, and the position of its global maximum uniquely determines the embedded
message bit pattern.</p>
    </sec>
    <sec id="sec-3">
      <title>3. The concept of the steganographic method based on the perfect binary arrays</title>
      <p>This section introduces the conceptual foundation of a steganographic method that leverages the
structural properties of perfect binary arrays. Unlike conventional transform-based approaches, the
proposed method operates entirely within the spatial domain, using perfect binary arrays as code
carriers to embed information through carefully controlled spatial transformations. The key idea is
to exploit the unique autocorrelation and cross-correlation characteristics of perfect binary arrays,
particularly their behavior under cyclic shifts and inversion. These algebraic symmetries enable
reliable and high-capacity data encoding while maintaining low computational complexity and
compatibility with resource-constrained environments. We describe the encoding and decoding
procedures, and the modulation scheme used to map information onto structured transformations of
perfect binary arrays.</p>
      <p>The main steps of the proposed steganographic method based on [11] are as follows.
Additional information embedding.</p>
      <p>Step 1. Perform a standard partition of the source container image into non-overlapping blocks of
size N N .</p>
      <p>Step 2. Choose a reference perfect binary array A0 (N ) of size N .</p>
      <p>Step 3. Let X be the next container block involved in the steganographic transformation. Choose
a vector D = {d 1 d 2 ... d log2 (2N 2 )} that contains the next log2(2N 2) bits of information to be
embedded in this container block.</p>
      <p>Step 4. Define the bit d 1 value as the encoding sign of the perfect binary array, the decimal
equivalents of the bits k 1 = {d 2 d 3 ... d log2(N )+1}10 as the value of the row shift, and the bits
k 2 = {d log2 (N )+2 d log2 (N )+3 ... d log2 (2N 2 )}10 as the column shift.</p>
      <p>Step 5. Construct an array Lk1A0 (N )Qk2 of the E (N ) -class for embedding additional information
and perform embedding, then the next block of the steganographic message will be defined as
M = X +Lk1A0 (N )Qk2 .</p>
      <p>B (m ,n ) = A0(N ) ** .
2.2. Find the row x and column y indices of the maximum (absolute value) of the matrix B (m ,n )
.</p>
      <p>
        Note that when embedding the value +1 into the container pixel value 255, as well as when
embedding the value -1 into the container pixel value 0, the embedding operation for these pixels is
not performed.
(
        <xref ref-type="bibr" rid="ref14">14</xref>
        )
(
        <xref ref-type="bibr" rid="ref15">15</xref>
        )
Additional information extraction.
      </p>
      <p>Step 1. Perform a standard partition of the steganographic message into non-overlapping blocks
of size N N .</p>
      <p>Step 2. Let M to be the next block of the possibly perturbed steganographic message, involved in
the steganographic transformation, corresponding to the block X of the container.
2.1. Construct a matrix  =M −X with elements (i ,j ), i ,j = 0,1,..., − 1 for which to construct
the 2DPCCF matrix
2.3. Restore the log2(2N 2) embedded information bits as
d1 = sign (B (x , y )) − 1(mod3);

{d2 d3 ... dlog2 (N )+1}10 = x ;

{dlog2 (N )+2 dlog2 (N )+3 ... dlog2 (2N 2 )}10 = y .
(16)</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental data</title>
      <p>This section presents the experimental evaluation of the proposed steganographic method based on
perfect binary arrays. The method's performance is assessed according to key steganographic
metrics, including embedding capacity, perceptual transparency, and robustness against
messagetargeted attacks.</p>
      <p>To evaluate the efficiency of the proposed method in terms of data payload, we compare its
embedding capacity with that of the classical code-controlled steganographic approach based on
Walsh-Hadamard functions. The comparison is performed for various block sizes N N , which
determine the granularity of embedding. While the classical method typically encodes a single bit
per block regardless of size, the proposed scheme leverages the structural properties of perfect binary
arrays to encode up to log2(2N 2) bits per block. Table 1 summarizes the resulting capacities in terms
of bits per block and bits per pixel.</p>
      <p>The data presented in Table 1 demonstrates the significant advantage of the proposed method
over the classical code-controlled approach in terms of embedding capacity. While the classical
method consistently embeds only 1 bit per block regardless of block size, the proposed method
exploits the combinatorial richness of perfect binary arrays to achieve a markedly higher payload.
Notably, for small block sizes (e.g., N = 4 ), the proposed method achieves a fivefold increase in
throughput per pixel. Even for larger blocks, where embedding density typically declines, the method
maintains a considerable advantage in both bits per block and bits per pixel. This highlights the
method’s potential for applications requiring high-capacity embedding, particularly when
maintaining visual quality is essential.</p>
      <p>Assessing perceptual fidelity is a complex task due to the subjective nature of human visual
perception. The human visual system exhibits varying sensitivity to spatial, frequency, and color
distortions, making formal evaluation inherently limited. Nevertheless, in the proposed method, the
modification of container elements is strictly bounded: changes do not exceed 1 in magnitude. This
constraint ensures a minimal distortion footprint, which is expected to be imperceptible under
normal viewing conditions. To support this claim, we provide a quantitative analysis using the peak
signal-to-noise ratio (PSNR) metric for different embedding densities, reflecting the proportion of
modified blocks in the image.</p>
      <p>The PSNR is evaluated as
MSE = p 12 = p
100 100
.</p>
      <p>(17)
(18)
where MSE is the root mean square error between the original and modified image. If p % pixels are
changed by ±1, then</p>
      <p>In Table 2 we present the values of PSNR for different embedding rates</p>
      <p>The results presented in Table 2 confirm that the proposed method preserves excellent perceptual
fidelity across different embedding rates. Even at 100% embedding, where each block contributes to
data hiding, the PSNR remains above 48 dB — well within the range considered visually
imperceptible. This robustness stems from the method’s foundational design, inherited from the
code-controlled paradigm, where modifications are limited to ±1 per pixel. By carefully constraining
the amplitude of changes, the proposed approach ensures that the embedded information does not
introduce noticeable visual artifacts, thus maintaining the visual integrity of the cover image.</p>
      <p>The experiments were performed on standard 500 test images subjected to JPEG compression to
simulate realistic transmission conditions. We show in Table 3 the obtained dependency of the
decoding error rate on the compression rate QF.</p>
      <p>The experimental results demonstrate that even with a relatively small block size of 8 8 and
embedding of 7 bits per block, representing a sevenfold increase in payload compared to classical
code-controlled methods, the proposed technique maintains acceptable performance under low
levels of JPEG compression, which is an impressive outcome given the aggressive payload and lossy
compression. These results raise an important and underexplored question in steganographic design:
Is it more effective to use small blocks with limited payload to ensure robustness, or to utilize larger
blocks that accommodate more data per unit but may exhibit different distortion-resilience
properties? As Shannon observed in his foundational work [15], larger codes often yield better
efficiency and robustness. Extrapolating this principle, larger block sizes may potentially provide
enhanced resistance not only to compression artifacts but also to steganalytic attacks, due to
increased structural complexity and embedding variability. This hypothesis suggests that the
traditional preference for small embedding units in spatial and transform-domain steganography
might need to be re-evaluated. Consequently, this opens a compelling direction for rethinking the
very foundation of steganographic design, possibly leading to the emergence of new principles and
embedding architectures grounded in large-block algebraic frameworks.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>This paper introduced a novel steganographic method based on perfect binary arrays, offering a fresh
algebraic perspective on payload encoding within digital images. The proposed technique
significantly increases embedding capacity by exploiting the unique autocorrelation and
crosscorrelation properties of perfect binary arrays and their cyclic shifts, enabling the modulation of up
to 2N 2 distinct states within a block of size N N . Compared to classical code-controlled
approaches that typically embed only one bit per block, our method demonstrates up to sevenfold
improvements in throughput without compromising perceptual quality.</p>
      <p>Experimental results confirm that the modifications introduced to the spatial domain are minimal,
with pixel-level changes constrained within ±1, yielding high PSNR values and excellent visual
imperceptibility. Moreover, the method retains robustness under moderate compression, suggesting
suitability for real-world applications, including constrained environments such as IoT platforms.
The analysis also raises essential theoretical considerations: while smaller blocks have traditionally
dominated steganographic designs, larger blocks, as advocated by Shannon for coding, may offer
increased resistance to compression and steganalysis, pointing toward the need for reevaluating
current paradigms.</p>
      <p>Overall, the proposed concept not only advances the practical utility of spatial-domain
steganography but also opens new avenues for integrating algebraic structures into the core of
information-hiding systems.</p>
      <p>Declaration on Generative AI
The authors used Grammarly for grammar and spelling checks and GPT-4 for paraphrasing and
rewording several sentences. All scientific ideas, analyses, conclusions, and interpretations are solely
the authors’ own, and no generative AI tools were used to develop or formulate the scientific content
of the manuscript.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>H.</given-names>
            <surname>Vakani</surname>
          </string-name>
          et al. “
          <article-title>Dct-in-dct: A novel steganography scheme for enhanced payload extraction quality</article-title>
          ”
          <source>IEEE International Conference on Industry 4</source>
          .0,
          <string-name>
            <given-names>Artificial</given-names>
            <surname>Intelligence</surname>
          </string-name>
          , and Communications Technology (
          <year>2021</year>
          ):
          <fpage>201</fpage>
          -
          <lpage>206</lpage>
          . doi:
          <volume>10</volume>
          .1109/iaict52856.
          <year>2021</year>
          .9532553
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sabeti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Aghabagheri</surname>
          </string-name>
          ,
          <article-title>Developing an adaptive DCT-based steganography method using a genetic algorithm</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          <volume>82</volume>
          ,
          <issue>13</issue>
          (
          <year>2023</year>
          )
          <fpage>19323</fpage>
          -
          <lpage>19346</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11042-022-14166-3
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          <volume>83</volume>
          ,
          <issue>7</issue>
          (
          <year>2024</year>
          )
          <fpage>20357</fpage>
          -
          <lpage>20386</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11042-023-16330-9
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sahu</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Pradhan “A novel image steganography technique using AES encryption in DCT domain” International Conference on Distributed Computing and Intelligent Technology</article-title>
          , Cham, Springer Nature Switzerland (
          <year>2023</year>
          ):
          <fpage>349</fpage>
          -
          <lpage>354</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -24848-1_
          <fpage>26</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Liu</surname>
          </string-name>
          et al. “
          <article-title>Robust JPEG Image Steganography Using Wavelet Domain SVD</article-title>
          and
          <string-name>
            <surname>Adaptive</surname>
            <given-names>QIM</given-names>
          </string-name>
          ” International Conference on Signal and Image
          <string-name>
            <surname>Processing</surname>
          </string-name>
          (
          <year>2023</year>
          ):
          <fpage>434</fpage>
          -
          <lpage>438</lpage>
          . doi:
          <volume>10</volume>
          .1109/icsip57908.
          <year>2023</year>
          .10270839
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Pramanik</surname>
          </string-name>
          ,
          <article-title>An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          <volume>82</volume>
          ,
          <issue>22</issue>
          (
          <year>2023</year>
          )
          <fpage>34287</fpage>
          -
          <lpage>34319</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11042-023-14505-y
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          et al.,
          <string-name>
            <surname>Enhanced</surname>
            <given-names>CNN</given-names>
          </string-name>
          -DCT Steganography:
          <article-title>Deep Learning-Based Image Steganography Over Cloud</article-title>
          ,
          <source>SN Computer Science</source>
          <volume>5</volume>
          ,
          <issue>4</issue>
          (
          <year>2024</year>
          )
          <article-title>408</article-title>
          . doi:
          <volume>10</volume>
          .1007/s42979-024-02756-x
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Ray</surname>
          </string-name>
          et al.,
          <article-title>Image steganography using deep learning based edge detection</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          <volume>80</volume>
          ,
          <issue>24</issue>
          (
          <year>2021</year>
          )
          <fpage>33475</fpage>
          -
          <lpage>33503</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11042-021-11177-4
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hassaballah</surname>
          </string-name>
          et al.,
          <article-title>A novel image steganography method for industrial internet of things security</article-title>
          ,
          <source>IEEE Transactions on Industrial Informatics</source>
          <volume>17</volume>
          ,
          <issue>11</issue>
          (
          <year>2021</year>
          )
          <fpage>7743</fpage>
          -
          <lpage>7751</lpage>
          . doi:
          <volume>10</volume>
          .1109/tii.
          <year>2021</year>
          .3053595
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Meenadshi</surname>
          </string-name>
          et al. “
          <string-name>
            <surname>AI-Enhanced</surname>
            <given-names>LSB</given-names>
          </string-name>
          Steganography Interface:
          <source>Concealed Data Embedding Framework” International Conference on Smart Structures and Systems</source>
          (
          <year>2023</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/icsss58085.
          <year>2023</year>
          .10407062
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Kobozeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Robust Steganographic Method with Code-Controlled Information Embedding</article-title>
          ,
          <source>Problemele energeticii regionale 4</source>
          ,
          <issue>52</issue>
          (
          <year>2021</year>
          )
          <fpage>115</fpage>
          -
          <lpage>130</lpage>
          . doi:
          <volume>10</volume>
          .52254/1857-
          <fpage>0070</fpage>
          .
          <year>2021</year>
          .4-
          <fpage>52</fpage>
          .
          <fpage>11</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Kobozeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>The Sufficient Condition for Ensuring the Reliability of Perception of the Steganographic Message in the Walsh-Hadamard Transform Domain</article-title>
          ,
          <source>Problemele Energeticii Regionale</source>
          <volume>54</volume>
          ,
          <issue>2</issue>
          (
          <year>2022</year>
          )
          <fpage>84</fpage>
          -
          <lpage>100</lpage>
          . doi:
          <volume>10</volume>
          .52254/1857-
          <fpage>0070</fpage>
          .
          <year>2022</year>
          .2-
          <fpage>54</fpage>
          .
          <fpage>08</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.I.</given-names>
            <surname>Mazurkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.Y.</given-names>
            <surname>Chechelnytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Murr</surname>
          </string-name>
          ,
          <article-title>Information security method based on perfect binary arrays</article-title>
          ,
          <source>Radioelectronics and Communications Systems</source>
          <volume>51</volume>
          ,11
          <fpage>612</fpage>
          -
          <lpage>614</lpage>
          . doi:
          <volume>10</volume>
          .3103/s0735272708110095
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>M.I. Mazurkov</surname>
          </string-name>
          ,
          <article-title>Broadband radio communication systems</article-title>
          ,
          <source>Science and Technology</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>C.E.</given-names>
            <surname>Shannon</surname>
          </string-name>
          ,
          <article-title>A mathematical theory of com-munication</article-title>
          ,
          <source>The Bell system technical journal 27</source>
          ,
          <issue>3</issue>
          (
          <year>1948</year>
          )
          <fpage>379</fpage>
          -
          <lpage>423</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>