References
- Kahn D. The history of steganography. In: Anderson R, editor. Information hiding. Lecture notes in computer science. Berlin, Heidelberg: Springer, 1996. p. 1–5. https://link.springer.com/content/pdf/10.1007/10719724.pdf.
- Cheddad A, Condell J, Curran K, et al. Digital image steganography: survey and analysis of current methods. Signal Process. 2010;90(3):727–752. doi: 10.1016/j.sigpro.2009.08.010
- Poisel R, Tjoa S. 2011. Forensics Investigations of Multimedia Data: a review of the state-of-the-art. In: 2011 Sixth International Conference on IT Security Incident Management And IT Forensics, p. 48–61. 10.1109/IMF.2011.14.
- Karampidis K, Kavallieratou E, Papadourakis G. A review of the image steganalysis techniques for digital forensics. J Inf Secur Appl. 2018;40(2018):217–235. doi: 10.1016/j.jisa.2018.04.005
- Cameron L. With cryptography easier to detect, cybercriminals Now hide malware in plain sight. Call it steganography. Here’s How It Works. [cited 2023 Oct 10]. https://www.computer.org/publications/tech-news/research/how-steganography-works.
- Olzak T. 2019. The security challenges and defense of hidden data. [cited 2023 Oct 10]. https://www.spiceworks.com/it-security/data-security/articles/the-security-challenges and-defense-of-hidden-data/
- Provos N, Honeyman P. Hide and seek: an introduction to steganography. IEEE Secur Privacy. 2003 May-June;1(3):32–44. doi: 10.1109/MSECP.2003.1203220
- How to Become a Digital Forensic Investigator. 2023 [cited 2023 Oct 10]. https://www.wgu.edu/career-guide/information-technology/digital-forensic-investigator-career.html
- Nissar A, Mir AH. Classification of steganalysis techniques: a study. Digital Signal Process. 2010;20(6):1758–1770. doi: 10.1016/j.dsp.2010.02.003
- Farooq N, Selwal A. Image steganalysis using deep learning: a systematic review and open research challenges. J Ambient Intell Human Comput. 2023;14(6):7761–7793. doi: https://doi.org/10.1007/s12652-023-04591-z
- Sajedi H. Steganalysis based on steganography pattern discovery. J Inf Secur Appl. 2016;3030:3–14. doi: https://doi.org/10.1016/j.jisa.2016.04.001
- YangzlTHU: IStego100K. original-date: 2019-07-10T03:03:05Z. 2023. [cited 2023 Oct 10]. https://github.com/YangzlTHU/IStego100K
- Bas P, Filler T, Pevny T. Break our steganographic system: the Ins and outs of organizing BOSS. In LNCS, information hiding. Vol. 6958, Berlin, Heidelberg: Springer. p. 59–70. doi: 10.1007/978-3-642-24178-9_5
- Mstafa R, Bach C. 2013. Information hiding in images using steganography techniques. ASEE Northeast Section Conference; 2023 Oct 10; Norwich University. 10.13140/RG.2.1.1350.9360
- Rustad S, Andono PN, Shidik GF. Digital image steganography survey and investigation (goal, assessment, method, development, and dataset. Signal Process. 2022;206:108908.
- Bachrach M, Shih FY. Image steganography and steganalysis. Wiley Interdiscip Rev Comput Stat. 2011;3(3):251–259. doi: 10.1002/wics.152
- Chutani S, Goyal A. A review of forensic approaches to digital image Steganalysis. Multimedia Tools Appl. 2019;78(13):18169–18204. doi: 10.1007/s11042-019-7217-0
- Mandal PC, Mukherjee I, Goutam P, et al. Digital image steganography: A literature survey. Inf Sci. 2022;609:1451–1488. ISSN 0020-0255. doi: 10.1016/j.ins.2022.07.120
- Sharma A, Batta A, Sharma VK. 2021 Fifth international conference on I-SMAC (IoT in social, Mobile, Analytics and cloud) (I-SMAC) palladam, India 2021 Nov. 11 - 2021 Nov. 13. (2021). 2021 fifth international conference on i-smac (iot in social, mobile, analytics and cloud) (i-smac). In A review on image steganography and its applications; India. (pp. 1466–1473). Essay, IEEE.
- Giarimpampa D. 2018. Blind image steganalytic optimization by using machine learning. [cited 2023 Oct 10]. https://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38150
- Johnson NF, Jajodia S. Steganalysis of images created using Current steganography software. In: Aucsmith D, editor. Information hiding. IH 1998. Lecture notes in computer science. Vol. 1525. Berlin, Heidelberg: Springer; 1998. doi: 10.1007/3-540-49380-8_19.
- Ruan F, Zhang X, Zhu D, et al. Deep learning for real-time image steganalysis: a survey. J Real Time Image Proc. 2020;17(1):149–160. doi: https://doi.org/10.1007/s11554-019-00915-5
- Arivazhagan S, Amrutha E, Sylvia LJW, et al. Digital image steganalysis: a survey on paradigm shift from machine learning to deep learning based techniques. IET Image Process. 2021;15(2):504–522. doi: 10.1049/ipr2.12043
- Lin L. The impact of exposure settings in digital image forensics. 2018 25th IEEE International Conference on Image Processing (ICIP), Athens, Greece, 2018, pp. 540–544, doi: 10.1109/ICIP.2018.8451688.
- Sarmah DK, Kulkarni AJ. Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography. J Inf Secur Appl. 2019;45:90–106. doi: 10.1016/j.jisa.2019.01.002
- Black Hat: Advanced JPEG Steganography and Detection by John Ortiz. 2014 [cited 2023 Oct 10]. https://www.youtube.com/watch?v=BQPkRlbVFEs
- Steganalysis, High Capacity Despite Better, and Andreas Westfeld. F5—A steganographic algorithm. Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings. Vol. 2137. Springer, 2001.
- Steghide. 2023, Nov 10. https://sourceforge.net/projects/steghide/
- Provos N. 2002. Outguess. Software. www.outguess.org.
- Lerch-Hostalot D. Aletheia. 2021. doi: 10.5281/zenodo.4655945
- snoop: StegExpose. 2023 original-date: 2014-08-03T08:38:52Z. [cited 2023 Oct 10]. https://github.com/b3dk7/StegExpose
- Butora J, Puteaux P, Bas P. 2022. Errorless Robust JPEG Steganography using outputs of JPEG coders. [cited 2023 Oct 10]. https://arxiv.org/abs/2211.04750.
- Badr M, Salama SI, Selim GI, et al. A review on steganalysis techniques: from image format point of view. Int J Comput Appl. 2014;102(4):11–19. doi: 10.5120/17802-8617
- Unsplash: Beautiful Free Images & Pictures | Unsplash. 2023 [cited 2023 Oct 10]. https://unsplash.com/
- Forensic-Investigation: Steganography and Steganalysis for Enhanced Forensic Analysis and Recommendations. 2023. original-date: 2023-07-26T11:43:37Z. [cited 2023 Oct 10]. https://github.com/Forensic-Investigation/
- Make grayscale image online - Free tool. 2023 [cited 2023 May 29]. https://grayscale.imageonline.co/
- iLovePDF: Resize multiple images at once!. 2023 [cited 2023 Oct 10]. https://www.iloveimg.com/resize-image.
- Provos N. Defending against statistical steganalysis. 10th USENIX Security Symposium (USENIX Security 01); Washington, D.C. 2001.
- Usage Statistics of Image File Formats for Websites. 2023 June. [cited 2023 Oct 10]. https://w3techs.com/technologies/overview/image_format
- Dalal M, Juneja M. Steganography and Steganalysis (in digital forensics): a cybersecurity guide. Multimedia Tools Appl. 2021;80(4):5723–5771. doi: 10.1007/s11042-020-09929-9
- Luck A. 2023. stegdetect. original-date: 2013-04-09T09:32:34Z. [cited 2023 Oct 10]. https://github.com/abeluck/stegdetect
- Samajdar T, Quraishi MI. Analysis and evaluation of image quality metrics. In: editors, Mandal J, Satapathy S, Kumar Sanyal M, Sarkar P, and Mukhopadhyay A. Information systems design and intelligent applications. Advances in intelligent systems and computing. Vol. 340. New Delhi: Springer; 2015. p. 369–378.
- Eid WM, Alotaibi SS, Alqahtani HM, et al. Digital Image Steganalysis: Current Methodologies and Future Challenges. IEEE Access. 2022;10:92321–92336. doi: https://doi.org/10.1109/ACCESS.2022.3202905
- Karampidis K. Image Steganalysis for Digital Forensics [ PhD thesis]. University of the Aegean, (2020). https://icsdweb.aegean.gr/aegeanrbtcs/wpcontent/uploads/2021/11/Karampidis_PhD_Dissertation.pdf
- Hammad BT, Ahmed IT, Jamil N. A steganalysis classification algorithm based on distinctive texture features. Symmetry. 2022;14(2):236. doi: 10.3390/sym14020236
- Hassan NA, Hijazi R. Chapter 6 - data hiding forensics. In: Hassan NA Hijazi R, editors.Data hiding techniques in Windows OS. Syngress. 2017. p. 207–265. ISBN 9780128044490. doi: 10.1016/B978-0-12-804449-0.00006-3
- Joshi I, Utkarsh A, Kothari R, et al. On estimating uncertainty of fingerprint enhancement models. In: Nafis UK, Amit KS, Karm VA, editors. Digital Image Enhancement and Reconstruction. Academic Press; 2023. p. 29–70. https://doi.org/10.1016/C2021-0-01039-7
- Hasan M. Stego analysis with StegSpy. LinkedIn; 2017. https://www.linkedin.com/pulse/stego-analysis-stegspy-mehedi-hasan/
- Fridrich J, Goljan M, Du R. Steganalysis based on JPEG compatibility. In: Multimedia systems and applications IV. Vol. 4518. SPIE; 2001. p. 275–280. https://doi.org/10.1117/12.448213.
- Hassan M, Amin M, Mahdi S. Steganalysis techniques and comparison of available softwares. In:Raed AA, Rana Z, Obed A, editors. Proceedings of the 1st International Multi Disciplinary Conference Theme: Sustainable Development and Smart Planning, IMDC SDSP 2020, Cyperspace, 28-30 June 2020. EAI, Cyberspace. https://eudl.eu/proceedings/IMDC-SDSP/2020
- Hussain M, Wahab AWA, Idris YIB, et al. Image steganography in spatial domain: a survey. Signal Process Image Commun. 2018;65:46–66. doi: 10.1016/j.image.2018.03.012
- Mehta P, Nair A, Edappilly S, et al. A comprehensive study of AI-Based steganalysis techniques on image and text documents. In: Tiwari S, Trivedi MC, Kolhe ML, Mishra KK Singh BK, editors. Advances in data and information sciences. Lecture notes in networks and systems. Springer; 2022. p. 53–63. doi: 10.1007/978-981-16-5689-7_5.
- Zhang Z, Hu D, Yang Y, et al. 2013. A universal digital image steganalysis method based on sparse representation. In: Ninth International Conference on Computational Intelligence and Security, p. 437–441. 10.1109/CIS.2013.99
- Zong H, Liu F-L, Luo X-Y. Blind image steganalysis based on wavelet coefficient correlation. Dig Inv. 2012;9(1):58–68. doi: 10.1016/j.diin.2012.02.003
- Wayner P. Disappearing cryptography. 2nd ed. USA: Morgan Kaufmann Publishers; 2002.
- Johnson NF, Katzenbeisser S. A survey of steganographic techniques. In: Katzenbeisser S, and Petitcolas FAP, editors Information hiding techniques for steganography and Digital Watermarking. Norwood: Artech House, INC; 2000. p. 43–78.
- Steganography X-C. 2020. Software. https://github.com/Xiao-Chong/steganography
- Crypture. 2021. Software. https://sourceforge.net/projects/crypture/
- SteganographX Plus. 2010. Software. https://leelusoft.blogspot.com/2010/03/steganographx-plus.html
- Roy AS. 2023. Analysing and extracting firmware using Binwalk. Medium. https://fr3ak-hacks.medium.com/analysing-and-extracting-firmware-using-binwalk982012281ff6#:~:text=What%20is%20Binwalk%20%3F%3F%3F,information%20security%20researcher%2C%20like%20yourself
- Binwalk. 2023. Software. https://github.com/ReFirmLabs/binwalk
- east-tec InvisibleSecrets. Software. https://www.east-tec.com/invisiblesecrets/
- Steganos Privacy Suite. Software. https://www.steganos.com/en/xmas-2023-steganos-privacy-suite
- StegoHunt™ MP. Steganalysis and Steganography Detection Tool. Software https://www.wetstonetech.com/products/stegohunt-steganography-detection/
- WinHex: Computer Forensics & Data Recovery Software, Hex Editor & Disk Editor. https://www.x-ways.net/winhex/
- Magnet Axiom. Recover & analyze your evidence in one case. Software https://www.magnetforensics.com/products/magnet-axiom/
- Desai MB, Patel SV, PrajapatI B. ANOVA and Fisher criterion based feature selection for lower dimensional universal image Steganalysis. Int J Image Process. 2016;10(3):145–160.
- Hostalot DL Introduction to steganalysis with Aletheia. [cited 2023 Oct 10]. https://daniellerch.me/stego/aletheia/intro-en/.