H. L. Jaheel, Z. Beiji, and A. L. Jaheel, “Design and implementation steganography system by using visible image,” International Journal on Smart Sensing and Intelligent Systems, vol. 8, no. 2, p. 1011, 2015.
M. Hassaballah, M. A. Hameed, and M. H. Alkinani, “Introduction to digital image steganography,” in Digital Media Steganography. Academic Press, 2020, pp. 1–15.
S. Rahman, F. Masood, W. U. Khan, N. Ullah, F. Q. Khan, G. Tsaramirsis, and M. Ashraf, “A novel approach of image steganography for secure communication based on LSB substitution technique,” Computers, Materials Continua, vol. 64, no. 1, pp. 31–61, 2020.
I. A. Neamah and H. R. Mohammed, “Text steganography in statistically clustered iris image,” EAI Endorsed Transactions on Energy Web, vol. 8, no. 33, pp. e8–e8, 2021.
R. Sun, T. Lei, Q. Chen, Z. Wang, X. Du, W. Zhao, and A. K. Nandi, “Survey of image edge detection,” Frontiers in Signal Processing, vol. 2, p. 826967, 2022.
B. Mohanty, R. Dash, and M. K. Pradhan, “Enhanced performance of canny edge detection algorithm: A comparative study,” Journal of Image Processing and Applications, vol. 19, no. 3, pp. 245–259, 2023.
Z. Zhang, W. He, and J. Zhao, “A segmentation-enhanced edge-based steganographic scheme for secure data hiding,” IEEE Access, vol. 8, pp. 32 145–32 153, 2020.
M. Habiban, F. R. Hamade, and N. A. Mohsin, “Hybrid edge detection methods in image steganography for high embedding capacity,” Cybernetics and Information Technologies, vol. 24, no. 1, pp. 157–170, 2024.
X. Wang, L. Zhang, and H. Zhou, “Randomized LSB steganography with high security and low distortion,” Multimedia Systems, vol. 24, no. 2, pp. 167–176, 2018.
A. F. M. Abadin, R. Sulaiman, and M. K. Hasan, “Randomization strategies in image steganography techniques: A review,” Computers, Materials Continua, vol. 80, no. 2, 2024.
L. Almazaydeh, “Secure rgb image steganography based on modified LSB substitution,” International Journal of Embedded Systems, vol. 12, no. 4, pp. 453–457, 2020.
A. S. Mali and M. M. Dongre, “Image steganography using center pixel offset based LSB embedding scheme,” International Journal of Applied Engineering Technology, vol. 5, no. 4, December 2023.
M. Z. Ali, O. Riaz, H. M. Hasnain, W. Sharif, T. Ali, and G. S. Choi, “Elevating image steganography: A fusion of msb matching and LSB substitution for enhanced concealment capabilities,” Computers, Materials Continua, vol. 79, no. 2, 2024.
M. S. Taha, M. S. M. Rahem, M. M. Hashim, and H. N. Khalid, “High payload image steganography scheme with minimum distortion based on distinction grade value method,” Multimedia Tools and Applications, vol. 81, no. 18, pp. 25 913–25 946, 2022.
S. Boujerfaoui, R. Riad, H. Douzi, F. Ros, and R. Harba, “Image watermarking between conventional and learning-based techniques: a literature review,” Electronics, vol. 12, no. 1, p. 74, 2022.
Y. Y. Demircan and S. Ozekes, “A novel LSB steganography technique using image segmentation,” Journal of Universal Computer Science (JUCS), vol. 30, no. 3, 2024.
G. Kaur and M. Singh, “Enhanced steganography scheme using image segmentation,” Multimedia Tools and Applications, vol. 78, no. 12, pp. 15 987–16 003, 2019.
S. Ahmed and K. Das, “Graded fuzzy edge detection-based pixel classification for optimizing imperceptibility in image steganography,” Journal of Information and Telecommunication, 2023. [Online]. Available: https://www.tandfonline.com/doi/abs/10.1080/13682199.2023.2219880
M. Hussain and B. Hussain, “A survey of image steganography techniques,” International Journal of Advanced Science and Technology, vol. 54, pp. 113–124, 2013.
I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, “Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research,” Neurocomputing, vol. 335, pp. 299–326, 2019.
Y. Wang and H. Wang, “A secure steganography method based on edge detection and random pixel selection,” Journal of Visual Communication and Image Representation, vol. 30, pp. 234–246, 2015.
H. Wang and Y. Zhang, “A hybrid edge detection and lbp code-based approach for image steganography,” Future Internet, vol. 15, no. 3, p. 108, 2023. [Online]. Available: https://www.mdpi.com/1999-5903/15/3/108
V. PS, Y. Zhou et al., “Optimal information hiding: Advanced bitstream-based watermarking for secure and efficient integration of image data in digital videos.” Journal of Engineering (2314–4912), vol. 2024, 2024.
M. N. Nobel, S. O. F. Sifat, R. Islam, Md. S. Sayeed, Md. and M. Amiruzzaman, “Enhancing gi cancer radiation therapy: Advanced organ segmentation with reseca-u-net model,” European Scientific Journal, 2024. [Online]. Available: https://www.ijournalse.org/index.php/ESJ/article/view/2186
S. Y. Irianto, R. Yunandar, M. S. Hasibuan, D. A. Dewi, and N. Pitsachart, “Early identification of skin cancer using region growing technique and a deep learning algorithm,” HighTech and Innovation Journal, vol. 5, no. 3, pp. 640–662, 2024.
J. Sorilla, T. S. C. Chu, and A. Y. Chua, “A uav based concrete crack detection and segmentation using 2-stage convolutional network with transfer learning,” HighTech and Innovation Journal, vol. 5, no. 3, pp. 690–702, 2024.
W. Yanto, N. M. Nayan, and R. S. Sulaiman, “A hybrid approach to detect and identify text in picture,” European Scientific Journal, 2024. [Online]. Available: https://www.ijournalse.org/index.php/ESJ/article/view/2005
A. K. Singh, H. V. Singh, and J. Singh, “Highly impartible spatial domain steganography in double precision images,” in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018, pp. 768–771.
T. Y. Goh, S. N. Basah, H. Yazid, M. J. A. Safar, and F. S. A. Saad, “Performance analysis of image thresholding: Otsu technique,” Measurement, vol. 114, pp. 298–307, 2018.
D. E. Elgezouli and A. B. Alzahrani, “Optimizing edge detection efficiency with a grünwald–letnikov fractional network,” Electronics, vol. 13, no. 16, p. 3298, 2024.
A. Chaudhary and A. Sharma, “A proposal to design a LSB based steganographic process through randomization,” in 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024, pp. 1–7.
J. Singh and M. Singla, “A novel method of high-capacity steganography technique in double precision images,” in 2021 International Conference on Computational Performance Evaluation (ComPE). IEEE, 2021, pp. 780–784.
S. Mukherjee and G. Sanyal, “Advancements and challenges in image steganography,” International Journal of Communication Networks and Information Security, vol. 11, no. 2, pp. 232–240, 2019.
W. Wu and H. Li, “A novel scheme for random sequential high-capacity data hiding based on PVD and LSB,” Signal, Image and Video Processing, vol. 18, no. 3, pp. 2277–2287, 2024.