Publisher
Springer Nature Switzerland
Reference13 articles.
1. Bandyopadhyay, S.K., Bhattacharyya, D., Ganguly, D., Mukherjee, S., Das, P.: A tutorial review on steganography. In: International Conference on Contemporary Computing (IC3-2008) (2008). https://www.jiit.ac.in/jiit/IC3/IC3_2008/IC32008.html
2. Al-Azzeh, J., Alqadi, Z., Ayyoub, B., Sharadqh, A.: Improving the security of LSB image steganography. Int. J. Inform. Vis. 3(4), 384–387 (2019). Computer Engineering Department, Al Balqa’a Applied University, Amman, Jordan
3. Babu, J., Rangu, S., Manogna, P.: A survey on different feature extraction and classification techniques used in image steganalysis. J. Inf. Secur. 8, 186–202 (2017). https://doi.org/10.4236/jis.2017.83013
4. Oludele, A., Sunday, I., Afolashade, K., Uchenna, N.: Security test using StegoExpose on hybrid deep learning model for reversible image steganography. Int. J. Comput. Trends Technol. 70(5), 7–14 (2022)
5. Ki-Hyun, J.: A study on machine learning for steganalysis. In: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing (ICMLSC 2019), pp. 12–15. Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3310986.3311000