Peer Review History
| Original SubmissionApril 26, 2024 |
|---|
|
PONE-D-24-14917Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A Systematic Literature ReviewPLOS ONE Dear Dr. APAU, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. Please submit your revised manuscript by Jul 01 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file. Please include the following items when submitting your revised manuscript:
If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter. If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols. We look forward to receiving your revised manuscript. Kind regards, Serdar Solak Academic Editor PLOS ONE Journal Requirements: When submitting your revision, we need you to address these additional requirements. 1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 2. Please remove your figures from within your manuscript file, leaving only the individual TIFF/EPS image files, uploaded separately. These will be automatically included in the reviewers’ PDF. 3. Please include captions for your Supporting Information files at the end of your manuscript, and update any in-text citations to match accordingly. Please see our Supporting Information guidelines for more information: http://journals.plos.org/plosone/s/supporting-information. Additional Editor Comments: The article should be subjected to a comprehensive review. Given that the article is a review study, it would be beneficial to include additional studies. The article should be updated in light of the suggestions provided by the referees. Some sections that are not essential should be shortened. [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #1: No Reviewer #2: Yes Reviewer #3: Yes Reviewer #4: Yes ********** 2. Has the statistical analysis been performed appropriately and rigorously? Reviewer #1: No Reviewer #2: Yes Reviewer #3: Yes Reviewer #4: Yes ********** 3. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #1: No Reviewer #2: Yes Reviewer #3: Yes Reviewer #4: Yes ********** 4. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #1: Yes Reviewer #2: Yes Reviewer #3: Yes Reviewer #4: Yes ********** 5. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #1: The importance of the article and its contribution to the literature are not reflected in the abstract. The abstract should include the context or background information for your research; the general topic under study; the specific topic of your research; why is it important to address these questions; the significance or implications of your findings or arguments. It must also contain numeric values. Please highlight your contribution. Reorganize the abstract to conclude: (a) The overall purpose of the study and the research problems you investigated. (b) The basic design of the study. (c) Major findings or trends found as a result of the study. (d) A brief summary of your interpretations and conclusions. Add more recent reference to enhance introduction section. Discuss the state-of-art techniques with their merits and issues. The literature should be developed and, if possible, presented in more papers published in last years. Discuss the research gaps and relate how the proposed work has improved them. In the introduction section, include spatial domain methods in your article. Also mention the difference between frequency and spatial domain methods For examples, “High embedding capacity data hiding technique based on EMSD and LSB substitution algorithms”, “Image steganography based on LSB substitution and encryption method: adaptive LSB+ 3”, “A New Dual Image Based Reversible Data Hiding Method Using Most Significant Bits and Center Shifting Technique” and “Data Hiding Based on Frequency Domain Image Steganography” You should submit more experimental study results for your work. You should also provide comparisons with similar studies. What solution you propose to make the system more robust. What is your difference from similar studies? Prepare and explain your numerical examples more clearly for data hiding and data extraction processes. In the study, it is necessary to present complexity analysis and security analysis. For security tests, histogram analysis and PDH can be given. You must also provide numeric values. Rewrite the conclusion with following comments:(a) Highlight your analysis and reflect only the important points for the whole paper. (b) Mention the implication in the last of this section. Please, carefully review the manuscript to resolve these issues. (c) This section should be supported with numerical values. There are grammatical errors in the article. Reviewer #2: 1-The abstract contains more information than it should, for example, the sites that have been approved for papers and future work for the research presented. It is best to approach this matter in summary. 2- Please provide the researcher's contributions in point form 3- The equations listed are not referenced to the references on which they were based. In addition, it would have been better to include performance evaluation metrics in a table showing each measure and its equation 4- Is it possible to include a figure showing the superiority of the methods mentioned in Table 9 over other methods listed in the same table to demonstrate the efficiency of each method through the approved standards? 5- Is it possible to arrange the references in Table 9 according to the year of publication for ease of follow-up? 6- In Table 10, please add a field that shows the ratio of the number of images used to the maximum number of images used and discuss this matter due to its importance. I find it best to separate the table into two tables, the first for grayscale images and the other for color images for easy follow-up. 7-Rewriting in point form of Section 4.6 Future scope and research directions for image steganography 8- The research still needs to include other research that uses biometric techniques to hide images, such as voice or facial features. Please add such research to existing references Reviewer #3: This paper presents an interesting image steganography overview. It covered systematic literature review of many stego techniques capable of resisting steganalysis attacks sampled from ACM Digital Library, IEEE Explore, Science Direct, and Wiley. The systematic review and Meta-Analyses have been synthesized and analysed using quantitative and qualitative methods. The works security and robustness are having significance, but the overall research presentation needs to be slightly improved covering some current aspects in order to be ready as publication, as noted within the following points that have to be fulfilled: 1- Give more elaboration on the real need for utilizing this Generative Adversarial Networks stego approaches. What is wrong in the normal other related stego methods requiring this kind of complex research. Try to support your explanation via real-life examples. 2- The study is recommended to consider the following image steganalysis researches within its coverage: == "Integrating machine learning and features extraction for practical reliable color images steganalysis classification", Soft Computing 27(19):13877-13888 (2023) == "Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier", Journal of Information Security and Applications 76:10354, Elsevier (2023) == “Is blind image steganalysis practical using feature-based classification?”. Multimedia Tools and Applications (MTAP) 83(2): 4579–4612 (2024) 3- The image security review presented is very promising showing its high capacity trade-off to security and robustness improvement as challenging processes. Try to benefit from the image stego secrecy researches below connecting to the capacity vs secrecy of stego hiding attempts provided: == "Efficient Reversible Data Hiding Multimedia Technique Based on Smart Image Interpolation", Multimedia Tools and Applications (MTAP) 79(39):30087-30109 (2020) == "Novel Embedding Secrecy within Images Utilizing an Improved Interpolation-Based Reversible Data Hiding Scheme", Journal of King Saud University - Computer and Information Sciences, 34(5):2017-2030 (2022) == "Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons", Arabian Journal for Science and Engineering (AJSE) 45:2631–2644 (2020) == "High performance image steganography integrating IWT and Hamming code within secret sharing", IET Image Processing, 18(1): 129-139 (2024) == “Dynamic smart random preference for higher medical image confidentiality”, Journal of Engineering Research (JER) 11(3A): 100-111 (2023) == "Vibrant Color Image Steganography using Channel Differences and Secret Data Distribution", Kuwait Journal of Science and Engineering (KJSE) 38(1B):127-142 (2011) == "Pixel Indicator Technique for RGB Image Steganography", Journal of Emerging Technologies in Web Intelligence (JETWI) 2(1):56-64 (2010) == “Improving grayscale steganography to protect personal information disclosure within hotel services”, Multimedia Tools and Applications (MTAP) 81(21): 30663–30683 (2022) == "Improving data hiding within colour images using hue component of HSV colour space", CAAI Transactions on Intelligence Technology, IET (IEE) - Wiley, 7(1): 56–68 (2022) == "Efficient Image Reversible Data Hiding Technique Based on Interpolation Optimization", Arabian Journal for Science and Engineering (AJSE) 46(9):8441–8456 (2021) == "Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections", International Journal of Computer Science and Network Security (IJCSNS) 20(12):167-176 (2020) 4- Combining cryptography and steganography is used a lot in literature as very promising philosophy to stand the privacy system against many security attacks. Although this combination is noted as extra payload in this direction, briefly link your review study work to the complexity combinations within the following studies: == "Enhancing Medical Data Security via Combining Elliptic Curve Cryptography with 1-LSB and 2-LSB Image Steganography", International Journal of Computer Science and Network Security (IJCSNS) 20(12):232-241 (2020) == "Protecting Medical Records against Cybercrimes within Hajj Period by 3-layer Security", Recent Trends in Information Technology and Its Application 2(3):1–21 (2019) == "Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography", International Journal of Computer Science and Network Security (IJCSNS) 20(8):1-8 (2020) == "Securing Matrix Counting-Based Secret-Sharing Involving Crypto Steganography", Journal of King Saud University - Computer and Information Sciences, ISSN:1319-1578, 34(9): 6909–6924 (2022) == "Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication", International Journal of Information Security and Privacy (IJISP) 16(1): 1-18 (2022) == "Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography", Arabian Journal for Science and Engineering (AJSE), 47(2): 2455–2477 (2022) == "Refining image steganography distribution for higher security multimedia counting-based secret-sharing", Multimedia Tools and Applications (MTAP) 80:1143–1173 (2021) == "Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography", Journal of Information Security and Cybercrimes Research (JISCR) 1(1):5-13 (2018) == "Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding", Journal of Computer Science & Computational Mathematics (JCSCM) 8(3):33-42 (2018) == “3-Layer PC Text Security via Combining Compression, AES Cryptography 2LSB Image Steganography”, Journal of Research in Engineering and Applied Sciences (JREAS) 3(4):118-124 (2018) == "Enhancing Speed of SIMON: A Light-Weight-Cryptographic Algorithm for IoT Applications", Multimedia Tools and Applications (MTAP) 78:32633–32657 (2019) Reviewer #4: Title: Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A Systematic Literature Review Comments: This article is a review article, so there is nothing new approach related to steganography techniques to be discussed. This article is well-written technically. And, although there have been many reviews of articles on image steganography, this article can still be considered because there is a special appreciation for the statistical approaches that are focused on this article. However, there are important points that can be taken into consideration to improve the content of this article. In RQ2, the author tries to explore steganography techniques and methods that are currently widely used to deal with attacks. It would be good if the discussion of RQ2 also discussed the issues that are generally raised in research on steganography. So, it will be seen that these techniques/methods are proposed to overcome certain problems. The connection between the problem/issue and the technique/method becomes clearer before discussing the advantages/weaknesses of a method. In short, if a 'problem/issue' column could be inserted before the 'technique/method' column, it seems that Table 7 would be more useful. ********** 6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #1: No Reviewer #2: No Reviewer #3: No Reviewer #4: No ********** [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step. |
| Revision 1 |
|
PONE-D-24-14917R1Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A Systematic Literature ReviewPLOS ONE Dear Dr. APAU, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. Please submit your revised manuscript by Aug 30 2024 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file. Please include the following items when submitting your revised manuscript:
If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols. We look forward to receiving your revised manuscript. Kind regards, Academic Editor PLOS ONE Journal Requirements: Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice. Additional Editor Comments: Authors should reflect the importance of the article in the abstract. The abstract is too long, please review and shorten it. Although 125 references are also mentioned in the abstract, there are 147 items in the references section. Use more academic language, have the article checked for grammar. Check your section numbers. Review your tables, figures and equations again. You should increase the figure quality. Check your fonts and size. [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation. Reviewer #2: All comments have been addressed Reviewer #3: All comments have been addressed Reviewer #4: All comments have been addressed ********** 2. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #2: Yes Reviewer #3: Yes Reviewer #4: Yes ********** 3. Has the statistical analysis been performed appropriately and rigorously? Reviewer #2: Yes Reviewer #3: Yes Reviewer #4: Yes ********** 4. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #2: Yes Reviewer #3: Yes Reviewer #4: Yes ********** 5. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #2: Yes Reviewer #3: Yes Reviewer #4: Yes ********** 6. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #2: (No Response) Reviewer #3: Thanks for the hard work. The revision is performed perfect. All comments are addressed in satisfying condition. Reviewer #4: Authors have revised and completed the manuscript according to my review from the previous round, especially to emphasize the RQ2 in their surveys. The discussion about RQ2 is now more complete with an exploration of methods along with the relevant problems. Additional information in Tables 7, 8, and 9 as well as the given brief explanation can enrich the reader's knowledge, especially on research topics in image hiding and steganography fields. ********** 7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #2: No Reviewer #3: No Reviewer #4: No ********** [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.
|
| Revision 2 |
|
Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A Systematic Literature Review PONE-D-24-14917R2 Dear Dr. APAU, We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements. Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication. An invoice will be generated when your article is formally accepted. Please note, if your institution has a publishing partnership with PLOS and your article meets the relevant criteria, all or part of your publication costs will be covered. Please make sure your user information is up-to-date by logging into Editorial Manager at Editorial Manager® and clicking the ‘Update My Information' link at the top of the page. If you have any questions relating to publication charges, please contact our Author Billing department directly at authorbilling@plos.org. If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org. Kind regards, Academic Editor PLOS ONE Additional Editor Comments (optional): After carefully reviewing the revised manuscript titled "Image Steganography Techniques for Resisting Statistical Steganalysis Attacks: A Systematic Literature Review" and considering the authors' responses to the reviewers' and editor's suggestions, I find that the authors have made the necessary revisions to address all concerns raised. The manuscript is now appropriate for acceptance. |
| Formally Accepted |
|
PONE-D-24-14917R2 PLOS ONE Dear Dr. APAU, I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now being handed over to our production team. At this stage, our production department will prepare your paper for publication. This includes ensuring the following: * All references, tables, and figures are properly cited * All relevant supporting information is included in the manuscript submission, * There are no issues that prevent the paper from being properly typeset If revisions are needed, the production department will contact you directly to resolve them. If no revisions are needed, you will receive an email when the publication date has been set. At this time, we do not offer pre-publication proofs to authors during production of the accepted work. Please keep in mind that we are working through a large volume of accepted articles, so please give us a few weeks to review your paper and let you know the next and final steps. Lastly, if your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org. If we can help with anything else, please email us at customercare@plos.org. Thank you for submitting your work to PLOS ONE and supporting open access. Kind regards, PLOS ONE Editorial Office Staff on behalf of Assoc. Prof. Serdar Solak Academic Editor PLOS ONE |
Open letter on the publication of peer review reports
PLOS recognizes the benefits of transparency in the peer review process. Therefore, we enable the publication of all of the content of peer review and author responses alongside final, published articles. Reviewers remain anonymous, unless they choose to reveal their names.
We encourage other journals to join us in this initiative. We hope that our action inspires the community, including researchers, research funders, and research institutions, to recognize the benefits of published peer review reports for all parts of the research system.
Learn more at ASAPbio .