Open Access
ITM Web Conf.
Volume 63, 2024
1st International Conference on Advances in Machine Intelligence, and Cybersecurity Technologies (AMICT2023)
Article Number 01001
Number of page(s) 8
Published online 13 February 2024
  1. M. M. Mahmoud, H. T. Elshoush, Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography-An Innovative Approach, IEEE Access, 10, 29954–29971, (2022). [CrossRef] [Google Scholar]
  2. F. Hemeida, W. Alexan, S. Mamdouh, Blowfish – Secured Audio Steganography, in 2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES), 2019, 1, 17–20, (2019). [Google Scholar]
  3. S. B. S.- Smieee, R. S. Mohammed, Recent Audio Steganography Trails and its Quality Measures, in 2019 International Conference of Computer and Applied Sciences (CAS2019), 18 December 2019, Baghdad, Iraq, (2019). [Google Scholar]
  4. M. H. N. Azam, F. Ridzuan, M. N. S. M. Sayuti, A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography, Pertanika J.Sci. Technol., 30(1), 497–511, (2022). [CrossRef] [Google Scholar]
  5. M. H. Noor Azam, F. Ridzuan, M. N. S. Mohd Sayuti, A. A. Alsabhany, Balancing the Trade-Off between Capacity and Imperceptibility for Least Significant Bit Audio Steganography Method: A New Parameter, in 2019 IEEE Conference on Application, Information and Network Security, AINS 2019, 19–21 November 2019, Pulau Pinang, Malaysia, (2019). [Google Scholar]
  6. S. Utama, R. Din, Performance Review of Feature-Based Method in Implementation Text Steganography Approach, J. Adv. Res. Appl. Sci. Eng. Technol., 28(2), 325–333, (2022). [Google Scholar]
  7. A. A. Alsabhany, A. H. Ali, F. Ridzuan, A. H. Azni, M. R. Mokhtar, Digital Audio Steganography: Systematic Review, Classification, and Analysis of the Current State of the Art, Comput. Sci. Rev., 38, 100316, (2020). [CrossRef] [Google Scholar]
  8. S. Ahani, S. Ghaemmaghami, Z. J. Wang, A Sparse Representation Based Wavelet Domain Speech Steganography Method, IEEE/ACM Trans. Audio Speech Lang. Process., 23(1), 80–91, (2015). [Google Scholar]
  9. S. Solak, High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms, IEEE Access, 8, 166513–166524, (2020). [CrossRef] [Google Scholar]
  10. M. Wakiyama, Y. Hidaka, K. Nozaki, An Audio Steganography by a Low-Bit Coding Method with Wave Files, in 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010, 15–17 October 2010, Darmstadt, Germany, (2010). [Google Scholar]
  11. Z. Wang, X. Zhang, Z. Qian, Practical Cover Selection for Steganography, IEEE Signal Process. Lett., 27(c), 71–75, (2020). [CrossRef] [Google Scholar]
  12. P. D. Shah, R. S. Bichkar, Genetic Algorithm Based Approach to Select Suitable Cover Image for Image Steganography, in 2020 International Conference for Emerging Technology, INCET 2020, 05–07 June 2020, Belgaum, India, (2020). [Google Scholar]
  13. R. D. Rashid, Cover Image Selection for Embedding Based on Different Criteria, Mob. Multimedia/Image Process. Secur. Appl. 2020, 11399, 30, (2020). [Google Scholar]
  14. N. Hamid, B. S. Sumait, B. I. Bakri, O. Al-Qershi, Enhancing Visual Quality of Spatial Image Steganography Using SqueezeNet Deep Learning Network, Multimed. Tools Appl., 80(28–29), 36093–36109, (2021). [CrossRef] [Google Scholar]
  15. M. H. Noor Azam, F. Ridzuan, M. N. S. Mohd Sayuti, Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm, J. Inf. Commun. Technol., 22(2), 255–282, (2023). [Google Scholar]
  16. M. K. Linga Murthy, P. B. Madhavi, S. A. Ahamad, K. Vamsi, Y. Mallikarjuna Rao, Implementation and Analysis of Image Steganography using Convolution Neural Networks, Int. Interdiscip. Humanit. Conf. Sustain. IIHC 2022 - Proc., 108–113, (2022). [Google Scholar]
  17. Lindawati, R. Siburian, Steganography Implementation on Android Smartphone Using the LSB ( Least Significant Bit ) to MP3 and WAV Audio, in the 3rd International Conference on Wireless and Telematics 2017, 27–28 July 2017, Palembang, Indonesia, (2017). [Google Scholar]
  18. P. C. Mandal, I. Mukherjee, G. Paul, B. N. Chatterji, Digital image steganography: A literature survey, Inf. Sci. (Ny)., 609, 1451–1488, (2022). [CrossRef] [Google Scholar]
  19. A. A. Alsabhany, F. Ridzuan, A. H. Azni, The Progressive Multilevel Embedding Method for Audio Steganography, J. Phys. Conf. Ser., 1551(1), 1–13, (2020). [Google Scholar]
  20. M. Anwar, M. Sarosa, E. Rohadi, Audio steganography using lifting wavelet transform and dynamic key, Proceeding - 2019 Int. Conf. Artif. Intell. Inf. Technol. ICAIIT 2019, 133–137, (2019). [Google Scholar]
  21. F. Djebbar, Securing IoT Data Using Steganography: A Practical Implementation Approach, Electronics, 10(21), 2021. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.