Javascript must be enabled to continue!
Cover Selection in Steganography: A Systematic Literature Review
View through CrossRef
Steganography involves embedding a secret message within another message, image, or video. This practice obscures the message and ensures that only the intended receiver can read it. Generally, the cover quality significantly impacts the overall effectiveness of the steganography system. Nevertheless, limited audio steganography-related articles on cover selection analysis have been observed. Therefore, this systematic literature review (SLR) presented a comprehensive analysis of the steganography-based cover selection, including their contexts and contents. An extensive search for relevant articles was initially conducted in this SLR. Specific inclusion and exclusion criteria were employed to ensure that only relevant articles were selected. A total of 44 articles were then selected and analyzed to identify the parameters and evaluation metrics used in cover selection. Consequently, the analysis determined four primary categories containing the cover selection techniques: image, audio, text, and video-based cover selections. Several factors influencing the cover selection were also identified based on the articles, such as parameters used in different mediums, standard evaluation metrics on each medium, and correlation between metrics performance and parameters. These findings indicated that the frequently utilized parameters were message and cover sizes. The imperceptibility [Peak-Signal-Noise-Ratio (PSNR) and Signal-Noise-Ratio (SNR)] was also the highest evaluation metric used in determining the effectiveness of the cover selection technique. Overall, this SLR served as a valuable resource for steganography researchers, bridging the gap between two research fields [machine learning (ML) and steganography]. A clear direction could be provided to future researchers through advanced analysis using this SLR to improve ML-related cover selection methods.
Title: Cover Selection in Steganography: A Systematic Literature Review
Description:
Steganography involves embedding a secret message within another message, image, or video.
This practice obscures the message and ensures that only the intended receiver can read it.
Generally, the cover quality significantly impacts the overall effectiveness of the steganography system.
Nevertheless, limited audio steganography-related articles on cover selection analysis have been observed.
Therefore, this systematic literature review (SLR) presented a comprehensive analysis of the steganography-based cover selection, including their contexts and contents.
An extensive search for relevant articles was initially conducted in this SLR.
Specific inclusion and exclusion criteria were employed to ensure that only relevant articles were selected.
A total of 44 articles were then selected and analyzed to identify the parameters and evaluation metrics used in cover selection.
Consequently, the analysis determined four primary categories containing the cover selection techniques: image, audio, text, and video-based cover selections.
Several factors influencing the cover selection were also identified based on the articles, such as parameters used in different mediums, standard evaluation metrics on each medium, and correlation between metrics performance and parameters.
These findings indicated that the frequently utilized parameters were message and cover sizes.
The imperceptibility [Peak-Signal-Noise-Ratio (PSNR) and Signal-Noise-Ratio (SNR)] was also the highest evaluation metric used in determining the effectiveness of the cover selection technique.
Overall, this SLR served as a valuable resource for steganography researchers, bridging the gap between two research fields [machine learning (ML) and steganography].
A clear direction could be provided to future researchers through advanced analysis using this SLR to improve ML-related cover selection methods.
Related Results
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
This review summarizes the evidence from six randomized controlled trials that judged the effectiveness of systematic review summaries on policymakers' decision making, or the most...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....
Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The...

