Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review

  • Richard Apau ,

    Roles Conceptualization, Data curation, Investigation, Methodology, Writing – original draft

    rich4u34@yahoo.com

    Affiliation Department of Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana

  • Michael Asante,

    Roles Software, Supervision, Validation, Writing – review & editing

    Affiliation Department of Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana

  • Frimpong Twum,

    Roles Supervision, Validation, Visualization, Writing – review & editing

    Affiliation Department of Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana

  • James Ben Hayfron-Acquah,

    Roles Data curation, Supervision, Validation, Writing – review & editing

    Affiliation Department of Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana

  • Kwame Ofosuhene Peasah

    Roles Conceptualization, Validation, Writing – review & editing

    Affiliation Department of Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana

Abstract

Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are limited. This paper aims to fill the existing gap in extant literature on image steganography schemes capable of resisting statistical steganalysis attacks, by providing a comprehensive systematic literature review. This will ensure image steganography researchers and data protection practitioners are updated on current trends in information security assurance mechanisms. The study sampled 125 articles from ACM Digital Library, IEEE Explore, Science Direct, and Wiley. Using PRISMA, articles were synthesized and analyzed using quantitative and qualitative methods. A comprehensive discussion on image steganography techniques in terms of their robustness against well-known universal statistical steganalysis attacks including Regular-Singular (RS) and Chi-Square (X2) are provided. Trends in publication, techniques and methods, performance evaluation metrics, and security impacts were discussed. Extensive comparisons were drawn among existing techniques to evaluate their merits and limitations. It was observed that Generative Adversarial Networks dominate image steganography techniques and have become the preferred method by scholars within the domain. Artificial intelligence-powered algorithms including Machine Learning, Deep Learning, Convolutional Neural Networks, and Genetic Algorithms are recently dominating image steganography research as they enhance security. The implication is that previously preferred traditional techniques such as LSB algorithms are receiving less attention. Future Research may consider emerging technologies like blockchain technology, artificial neural networks, and biometric and facial recognition technologies to improve the robustness and security capabilities of image steganography applications.

1. Introduction

Information technology has revolutionized many aspects of the human society. Presently, computing technologies have permeated our daily activities including shopping, banking, education, and communication [1]. These technologies have boosted productivity and automated many tasks. With the increased pervasive network connectivity and technology convergence, an enormous amount of information is produced, processed, stored, and shared every day [2]. For example, Facebook sees over 147, 000 pictures uploaded every 60 seconds [3]. Organizations rely heavily on information technologies for communication and information sharing [4]. Technological platforms such as email, videoconferencing, and social media apps are widely used by organizations to facilitate employee information sharing, meetings, and/or public product advertising.

While information sharing through computing technologies has its benefits, it is also susceptible to various threats such as cyber-attacks, data theft, and data breaches [5]. Numerous reports exist regarding data leakage, data loss, and unauthorized access to confidential information in digital communication [6,7]. Data breaches have affected many companies and organizations across different sectors, resulting in multimillion-dollar losses to cyber criminals [8]. Cybercrime Ventures [9] estimated annual cost of data breaches to reach 10.5 trillion United States dollars globally by 2025. Records totaling 4.5 billion were exposed by mid-2018 alone, whereas in 2019 identity records totaling 2.7 billion were exposed [10]. For example, the Thales 2022 data threat report revealed that 45% of companies in the United States experienced data breaches [11]. Additionally, in 2022, T-Mobile data breach pay-outs to customers and regulation fines cost the company 350 million dollars [12]. An Analysis by Nallainathan [13] projected a rise in cyber-attack trends in the next decade. As organizations suffer these occurrences, they incur significant financial and reputational losses [13]. According to Bouveret [14], more than 1 billion US dollars has been lost by financial institutions since 2010. Further, the operations of many institutions are threatened by these threats as cyber-attacks continue to grow more complex and sophisticated. Poor security measures are at the heart of many of these data breaches. Consequently, securing communication and information exchange has thus become paramount.

Given the rapid pace of data compromises and the potential threats to the security of individual and organizational data, steganography, which is an information-hiding technique, and cryptography, a data protection approach has gained notable attention in recent years. While cryptography ensures data confidentiality by altering the meaning of the message being transmitted, steganography conceals the existence and contents of secret information [15]. In other words, cryptographic techniques transform the message such that its original meaning is obscured from an unauthorized entity [16] and steganography covertly embeds the message within an innocent-looking cover (or media) [17]. Although cryptography is effective in securing communication channels, it is limited because the jumbled messages arouse suspicion in the minds of intruders, who potentially may destroy the message [18]. Hence, the intended recipient may not get access to the message. Also, a technique called cryptanalysis serves as a countermeasure against cryptography with the intended aim of revealing a secret message, thereby undermining the security, privacy, and secrecy of the message [1926]. Steganography therefore provides another layer of security to enhance the protection of data against unauthorized access and use. Steganography is effective for ensuring confidentiality, integrity, and availability [27].

Steganographic applications are categorized into five types. These are image steganography, network protocol steganography, text steganography, video steganography, and audio steganography [1]. However, image steganography has gained the most popularity due to the degree of redundancy associated with images [28]. As image steganography continues to gain relevance as an effective approach in the field of information security, techniques for detecting hidden messages have emerged. Specifically, steganalysis is a technique that aims at uncovering and extracting hidden messages from a cover (or media) that is gaining prominence in the domain [18]. Statistical steganalysis mechanisms such as RS attacks detect the presence of LSB-based hidden secret messages [29]. These mechanisms have exposed image steganography, rendering images a prime target for cyber-attacks. Given the rapid advancement and increasing sophistication of information technologies, steganalysis techniques are expected to grow more powerfully [15]. For the image steganography technique to be efficient, resistance against universal steganalysis attacks is paramount. Consequently, more robust image steganography techniques capable of withstanding statistical steganalysis attacks are urgently needed. A comprehensive understanding of image steganography techniques for resisting statistical steganalysis is required to safeguard information against detection, alteration, and modification and to guarantee data protection assurances and enhanced information security.

Yet existing studies that examine image steganography techniques are limited, and relevant review studies fail to provide detailed empirical-based discussions on issues related to image steganography techniques. In other words, existing studies have not adopted a standardized methodology for reviewing the selected publications [3033]. For instance, Bhattacharyya and Banerjee [30], Febryan et al., [31], and Shehab and Alhaddad [34] all conducted review studies that employed steganography techniques to hide data in image, audio, and video but none of these studies adopted an empirical approach or standardized method for selecting the studies, potentially introducing errors, omissions, and biases that hinder informed decision-making.

This empirical systematic literature review aims to fill the existing gap in the literature and provides a comprehensive literature review on image steganography schemes proposed to resist statistical steganalysis attacks. Systematic literature reviews on image steganography techniques are limited, and the existing review studies do not provide an adequate and comprehensive understanding of the phenomena. This paper provides a holistic overview of the field’s advancements, methodologies, challenges, and emerging trends in statistical steganalysis attacks. The major contribution of this paper is as follows:

  • A systematic literature review of image steganography techniques capable of resisting steganalysis attacks is presented. Research articles from four reputable electronic databases comprising ACM Digital Library, IEEE Explore, Science Direct, and Wiley are selected.
  • Comprehensive analysis using quantitative and qualitative methods and tools is conducted on the selected articles to develop patterns, trends, techniques, methods, and performance of existing image steganography applications using standard evaluation metrics. This is intended to help information security practitioners and data protection scholars to be abreast with existing data protection schemes and measures.
  • Extensive comparisons are drawn among existing techniques to evaluate their merits and limitations as well as their robustness against statistical steganalysis attacks.
  • Finally, based on the analysis and findings, future directions would be provided in the field of image steganography aimed at guiding researchers and scholars to set the direction on emerging technologies and approaches that could be adopted for future research to improve security within the image steganography domain.

The rest of the paper is structured as follows: Section 2 of the paper provides an overview of background literature on image steganography and statistical steganalysis attacks, as well as discussions on existing review works and their limitations. The review methodology using PRISMA as demonstrated in Fig 2 is presented in Section 3. In section 4, comprehensive results following the qualitative and quantitative analysis are elaborated including future scope and research directions, whereas section 5 discusses the results and presents implications for the study findings. Finally, section 6 provides key findings, conclusions, limitations, and recommendations for future research studies.

Background literature

2.1 Image steganography

Information hiding in images has gained popularity in recent times [35]. Images have become important carriers to hide secret messages without changing the visual features and/or properties. As a result, images have become popular and widely used for steganography due to the degree of redundancy associated with them [36]. All image file formats are suitable for image steganography. File format types including TIFF, JPEG, PNG, GIF, and BMP are all appropriate to use. [37]. It is worth noting that each image file format has its advantages and disadvantages when employed for steganography purposes. Given that pixel values are utilized for image steganography, variations in pixel intensities between the original cover image and stego-images are sometimes experienced. The intensity variation is nonetheless subtle such that the undetectability and imperceptibility to the human visual system is achieved [38,39].

The commonality of images for steganography has subjected images to several targeted cyber-attacks including visual and statistical steganalysis attacks [40]. These attacks possess the ability to unearth concealed messages within images using steganalysis algorithms. Statistical steganalysis capabilities aimed at revealing hidden data in images include detection, extraction, disabling, and destruction of hidden data [41]. Tools and techniques used for such capabilities include lossy compression, denoising, image enhancement techniques, image approximation techniques, and geometrical modification [35]. These tools and techniques expose the vulnerabilities of image steganography on the digital landscape, rendering images a prime target of cybercriminal activities.

Image steganography uses three main traditional approaches (i.e., spatial domain, transform domain, and adaptive domain) to embed data [42]. The spatial domain approach entails the direct embedding of secret messages into image pixel values. This approach encompasses numerous techniques including the least significant bit (LSB) insertion algorithm [4345], quantization-based methods [46], histogram-based methods [47], prediction error [48], modulo operations [49], and many other variations. Spatial domain methods have the advantages of high visual quality with minimal distortion effects, and high embedding payload capacity [38]. However, the spatial domain is less robust, making it susceptible to various forms of manipulation and attacks [38].

Given the challenges associated with spatial domain approaches, transform domain techniques emerged as a compelling alternative for secret data embedding [50]. The transform domain utilizes frequency sub-band coefficients to insert the secret message bits [51,52]. Although the data embedding and extraction processes are intricate compared to the spatial domain, this approach bolsters system security [50]. This embedding technique possesses the capability to withstand data manipulation approaches such as cropping, scaling, compression, and rotation. Some existing transform domain algorithms include Discrete Cosine Transform (DCT) [51], Discrete Fourier Transform (DFT) [53], Integer Wavelet Transform (IWT) [54], and Discrete Wavelet Transform (DWT) [55] among others. This method offers competitive advantages over spatial domain approaches by enhancing the robustness of the steganographic applications. However, both spatial and transform domain approaches have limitations [56], particularly regarding the susceptibility of the cover image to data manipulation and modification. Notwithstanding these limitations, spatial domain methods such as LSB Insertion algorithm and Pixel Value Differencing (PVD) remain the most prevalent data embedding techniques for steganographic applications [57]. The spatial domain method alters the LSBs of the carrier image by directly replacing the LSBs of the original cover image with the secret message bits, while transform domain randomizes all the bits in the carrier image [58].

Considering the intricacies associated with spatial and transform domains, the adaptive domain method also known as the model-based method or masking has surfaced. This method employs dynamic techniques for pixel selection for data embedding and estimating an allowable number of bits that can be hidden within the carrier object [50]. Examples of this method include artificial intelligence, blockchain technology, machine learning, and genetic algorithms. Recent innovations have seen the implementation of biometric techniques and facial recognition technologies for image steganography, contributing to the security enhancement and robustness [5963]. Adaptive techniques have a comparative advantage over spatial and transform domains due to their robustness and the ability to avoid detection by statistical steganalysis attacks. This method is also able to efficiently balance the tradeoffs between embedding capacity and security. The trade-off high embedding capacity on one side and security and robustness improvement on another side, remains a challenge in image steganography applications, for which constant innovations are required.

2.2 Statistical steganalysis attacks

Steganalysis techniques undermine the security capabilities of steganography, as they detect messages concealed in images to reveal the message and estimate the size/length. Given that image steganography has gained prominence for secret information hiding, image steganalysis emerges as a countermeasure. Image steganalysis exploits image processing techniques such as cropping, filtering, and blurring to detect, extract, disable, or destroy hidden information within cover objects [64]. Steganalysis algorithms are extant, some of which include pixel difference histogram (PDH) analysis, sample-pair analysis, RS analysis, and Chi-square (X2) analysis [58] among others. RS steganalysis can detect LSB-based substitution stego-images, whereas Chi-square analysis which is based on a statistical distribution of binary values (0s and 1s) can determine if the image intensities follow random or distributed patterns. Statistical steganalysis process extracts the statistical characteristics of an image to accurately detect and estimate the exact size of hidden messages within a stego image [65]. By so doing, the hidden information is unveiled, and their length estimated. This breaches the confidentiality requirement of data transmission. All types of steganalysis possess the capability to identify, detect, and extract secret information hidden within a carrier object. For instance, PDH analysis can analyze and detect PVD-based image steganography. The analysis focuses on searching for the algorithm employed for the secret message concealment.

Chi-Square (X2) statistical steganalysis was proposed by Westfeld and Pfitzmann [66] with the ability to detect sequentially embedded messages within an image. This approach, however, could not identify the presence of hidden messages based on random embedding. Notably, Provos [67] improved the technique proposed by Westfeld and Pfitzmann [61] to have the ability to detect and estimate both sequentially and randomly hidden messages. The sample-pair technique proposed by Dumitrescu et al., [68], is also another effective approach to detecting hidden messages based on LSB steganographic hiding process. Among the various types of statistical steganalysis, the RS attack developed by Fridrich et al. [69] is the most effective and well-known steganalysis technique which possess the capability to detect and reveal secret messages embedded within an image. RS steganalysis technique detects both sequential and random embedded secret messages. Statistical attack techniques adeptly differentiate stego-images containing secret messages from cover images. This is done by mathematically investigating the relationship that exists between adjacent pixel groups and the pixel values of the stego-image, and the cover image [70]. Following the earlier work by Fridrich et al. [69], several steganalysis techniques with improved performance and detection capabilities have emerged [6569,7177]. The growing sophistication, complexity, and accuracy performance of steganalysis techniques have meant that a more secure image steganography scheme is required.

2.3 Previous/Related works

Empirical studies providing systematic review on image steganography techniques and methods aimed at resisting statistical steganalysis attacks are limited. Existing studies have failed to provide detailed empirical-based discussions on issues related to image steganography techniques and lacked a standardized methodology for reviewing the selected publications/articles. Ashwin et al., [78] conducted a review of image steganography techniques as well as steganalysis techniques capable of detecting secret information hidden in images. The study identified research trends, challenges, methods, and techniques for image steganography. Although Ashwin et al., [78] study provided early perspectives to scholars on existing techniques for resisting steganalysis attacks, the study was limited to only two embedding process approaches (i.e., spatial and transform). The study failed to provide broader insights into other notable techniques and algorithms dominating the field. The study also failed to adopt a standardized methodology for conducting the literature review. Subhedar and Mankar [79] focused on the issues and challenges of image steganography. The study provided key insights on image steganography performance evaluation metrics and explored various challenges that confront image steganography whose data embedding processes are based on spatial and transform domains. The study identified steganalysis techniques as key issues affecting the efficiency of steganography and provided future research direction. This study was however not systematic, as methods for selecting literature were not defined. The study also failed to discuss how existing techniques have performed against universal statistical steganalysis such as RDH and RS attacks.

Kadhim et al., [80] provided a review of image steganography techniques. The study discussed performance evaluation metrics as well as future research trends in the field of image steganography. The study provided key insights to researchers on the trends of digital image steganography but failed to provide a broader and comprehensive systematic review of key algorithms dominating the field. Standard methods were not applied in the selection of literature for the survey review. Mandal et al., [81] provided a review of digital image steganography tools available for embedding secret messages. The survey provided some image steganography techniques including adaptive and deep learning techniques and offered some key examples of some popular steganography tools. Comparison of the various tools were provided. Challenges of deep learning-based steganography were also enumerated. The study failed to adopt a standardized methodology for conducting the literature review and did not provide a comprehensive insight into all existing image steganography techniques/approaches. The study was limited to spatial and transform domain methods. Perhaps, the most comprehensive study and closely related to this paper is a systematic literature review conducted by Kaur et al., [50]. Kaur et al., [50] adopted standardized systematic literature review guidelines and selected 61 pieces of literature from four key databases comprising Web of Science, IEEE, Wiley, and ACM. The studies selected were published from 2011 to 2022. The results of the study show that extensive milestones for image steganography techniques have been achieved. Progress in all three data embedding processes (ie spatial, transform, and adaptive approaches) has seen notable improvement. The study further revealed that future research could focus on enhancing and striking an adequate balance between embedding capacity and robustness.

Other existing reviews focused on some specific domains within image steganography, further limiting the scope of the application of techniques for resisting statistical steganalysis. For example, Hussain et al., [82] provided a review on image steganography focusing on spatial domain techniques. The study highlighted some novel spatial domain techniques for image steganography including challenges and trends. Girdhar and Kumar [83] also provided a review of steganography techniques based on 3D images. Various 3D domain techniques including topological, geographical, and representation domains were discussed and compared in terms of payload capacity, resistance to attacks, and reversibility. Meng et al., [84] reviewed deep learning algorithm-based image steganography techniques. Various deep-learning algorithms were surveyed and discussed. Deep-learning algorithms used for coverless information hiding, steganalysis attacks, and watermarking were extensively presented and discussed. Qin et al., [85] comprehensively reviewed coverless image steganography techniques. The review provided a framework description of methods and techniques for coverless image steganography, highlighted recent developments in the area, and concluded that coverless image steganography provides resistance against steganalysis attacks.

Also, Puteaux et al., [86] focused their survey on reversible image steganography techniques. Techniques and methods compared included pixel value differencing or histogram shifting, re-echoing-based steganography, public key cryptography-based methods, prediction-based methods, and image partition-based techniques. Aslam et al., [87] conducted a review LSB based image steganography techniques. The review sampled 20 research studies published from 2016 to 2020. The 20 articles were further scaled down to 17 for the review. 20 data sets were identified for the evaluation of image steganography techniques. All the domain-specific studies reviewed [8286] could not be conveniently classified as a systematic literature review except Aslam et al., [87]. The studies failed the threshold for systematic literature review when compared to the guidelines provided by Kitchenham and Charters [88]. The methods adopted for the study selection including inclusion and exclusion criteria, datasets, databases, data extraction methods, and queries were not detailed.

The above review works discussed may not be exhaustive for review research on image steganography techniques capable of resisting statistical steganalysis. However, the extensive literature search conducted in the most relevant scientific databases and libraries provided little evidence of a systematic literature review for image steganography techniques. The identified knowledge gap and other germane issues are the focus of this review. This research, therefore, seeks to conduct investigations into the literature on image steganography techniques capable of resisting statistical steganalysis attacks. By so doing, the review brings to the fore relevant studies on image steganography methods for resisting statistical steganalysis to bridge and/or expose the knowledge gap.

3. Review methodology

This research adopted a standardized methodology and procedure for the systematic literature review. The aim was to meet the objectives set out for the review. The study relied on PRISMA guidelines and procedures for conducting a systematic literature review. Many scholars have recently utilized PRSIMA for systematic literature review studies within the information technology landscape and was considered an effective and exhaustive framework for conducting systematic review studies [50,8991].

3.1 Research approach

The PRISMA guidelines were chosen to ensure the review process is transparent, clear, and credible [92]. The processes involved in PRISMA include defining the systematic scoping review, identifying potential studies through literature searches in relevant databases and electronic libraries using predefined keywords, abstract screening, selecting papers based on inclusion and exclusion criteria, article characterization, and mapping based on keywords and meta-analysis [93]. Based on the PRISMA guidelines, a data selection, extraction, and classification taxonomy were developed and implemented. The taxonomy defined review questions, literature search strategy, eligibility criteria for inclusion and exclusion, data analysis framework, and criteria for resolving opinion disparities among researchers.

3.2 Review research questions and protocol

Kitchenham and Charters [88] argued that review questions and review protocols are important components of the systematic literature review process as they reduce the researcher’s biases and provide a critical framework to guide acceptable systematic reviews. Review questions are formulated during the initial stages of study planning to situate the study goals as the foundation upon which the study hinges [93]. This study adopted the Goal-Question-Metric approach suggested by Caldiera and Rombach [94] (See Table 1 for the Goal-Metric Questions). This Goal-Question-Metric has previously been used by Lun et al., [95] and Wiafe et al., [96] as an efficient and effective approach for deriving systematic review objectives.

Statistical steganalysis attacks are growing at a tremendous pace. As such, techniques and methods for steganography that could withstand such attacks have become topical. Questions such as the most used image steganography techniques for resisting steganalysis attacks, the performance and security impact of image steganography techniques, and future scope and research direction for techniques within the image steganography domain remain critical and unanswered concerns that require addressing. These knowledge gaps need to be addressed. The review questions, the reason behind the questions, and the research approach to achieve the questions are listed in Table 2.

Following the formulation of the research questions and to further avoid biases in the literature search strategy, search terms and keywords, and study selection, the review protocol was separately developed by each of the members of the research team. The individual protocols were merged and further refined by the research team in a protocol development meeting. The merged protocol was refined, and the final protocol was adopted after an extensive review process and corrections. Fig 1 provides a detailed diagrammatic representation of the final protocol adopted for the study demonstrating the main review processes followed.

thumbnail
Fig 1. Adopted review protocol for methodological analysis.

https://doi.org/10.1371/journal.pone.0308807.g001

3.3 Literature strategy

Brereton et al., [83] identified seven electronic databases as key for conducting exhaustive literature searches for studies within the information technology landscape and for software engineers specifically. These databases are IEEExplore, ACM Digital Library, Google Scholar, Citeseer Library, INSPEC, ScienceDirect, and EI Compendex. SCOPUS, Wiley Online, Web of Science (WOS), and Springer Link are also considered relevant electronic libraries [83]. Before the actual search, a preliminary search was conducted on Google Scholar, Citeseer, and SCOPUS to identify the most appropriate databases, search terms, and search period. Based on the preliminary search, four (4) databases (i.e., IEEE, ACM Digital, ScienceDirect, and Wiley Online) were chosen. These electronic databases and libraries were chosen because they had the most relevant published studies on image steganography techniques. The keywords and search terms used for the database searches were made up of two categories. The categories were Steganography and related words (steganography, image, image steganography) and Steganalysis and related words (Steganalysis, statistical steganalysis, RS steganalysis). The search phrases were developed by combining words from both categories using the “AND” Boolean Operator. After several searches in databases by the researchers, five search terms were perceived as appropriate based on the results from the preliminary search. These terms were (i) “Steganography” and “Steganalysis” (ii) “Image Steganography” and “Steganalysis” (iii) “Steganography” and “RS Steganalysis” (iv) “Image Steganography” and “Statistical Steganalysis” and (v) “Image” and “Statistical Steganalysis”. The search period was limited to 2012 to 2023 inclusive.

3.4 Eligibility criteria

For a publication to form part of this review, clear inclusion and exclusion criteria were defined. To be included, publications should have been written in English. Also, publications should have discussed image steganography and/or steganalysis attacks performance evaluation metrics. That is, publications whose titles related to image steganography and/or steganalysis attacks were included. Further, papers published from 2012 to 2023 were considered. Apart from these, only peer-reviewed publications were accepted. For the exclusion criteria, non-empirical studies were rejected. This suggests that point-of-view papers, review papers, and reports were excluded. Also, only peer-reviewed journal and conference papers were included. Book sections, chapters, posters, and thesis were excluded from the review. Moreover, publication abstracts that showed no relationship with the search terms were excluded. Publications whose content did not discuss how image steganographic techniques are employed to resist steganalysis attacks were removed. Lastly, publications ranked as low quality as agreed by the review team were excluded.

3.5 Study selection

Based on the search criteria, two (2) members of the review team performed independent searches using the identified search terms on all four (4) databases. For all searches, the search period was limited to 2012 to 2023 inclusive. The two (2) independent results were merged into one dataset. A total of 5146 publications were compiled. The dataset (n = 5146) was then screened to remove duplicates. After the duplicates were removed, 1379 publications remained. Next, the titles of the publications were scanned to determine their relatedness to the objectives of this review. For example, studies whose titles did not suggest any relation to image steganography techniques were removed. Next, the dataset was examined to maintain only journal and conference papers. Book sections, chapters, posters, and thesis were removed. Further, all non-empirical papers were discarded. This process reduced the total number of publications to 902. Reports were sought for retrieval and 13 reports were not retrieved. A total number of 889 records were maintained. After assessing the papers for eligibility, 736 papers were removed.

Two (2) members of the review team separately read the abstracts of the remaining publications (n = 153) to determine their relatedness to the search terms. The separate reports from the two (2) members were discussed by all members of the review team and merged. In cases of any disparities, a vote was conducted to resolve the issue. This activity further reduced the number of publications to 136. Lastly, two (2) other members of the review team read the content of the 136 publications to assess their quality. Their reports were also discussed and debated. Based on these discussions, 125 publications were retained as appropriate for review. Fig 2 provides a detailed summary of the selection process for the identified publications. Thus, 125 papers remained as final papers included in the systematic literature review. Also, a summary of the number of papers selected from the various electronic databases and the search terms is shown in Table 3.

thumbnail
Fig 2. PRISMA flow diagram for publication selection process.

https://doi.org/10.1371/journal.pone.0308807.g002

thumbnail
Table 3. Detailed record of articles selected for the systematic literature review.

https://doi.org/10.1371/journal.pone.0308807.t003

4. Results and analysis

4.1 Publication trends

The selected publications were analyzed to understand the publication trends. The information recorded for this analysis included the year of publication, publication outlet, publication type, geographic origination of corresponding authors, and number of citations. The results show that publications on image steganography techniques for controlling statistical steganalysis attacks have increased considerably. For the year of publications, the results show fluctuations in the number of publications per year from 2012 to 2017 (see Fig 3). Since 2017, the number of publications per year increased tremendously. Articles published from 2018 to 2023 represented 73% of the total number of publications reviewed. This suggests a growing interest in image steganography studies for combatting steganalysis attacks. The analysis also shows an interesting result for the post-coronavirus Pandemic era (COVID-19), as approximately 49% of all articles were published from 2021 to 2023. This shows tremendous development of techniques against statistical attacks, following the numerous cyber-attacks, data breaches, and data compromises that were experienced during the peak of the COVID-19 lockdowns and global work-from-home phenomenon.

The results also indicated a skewed interest in publishing outlets. From the total of 125 papers reviewed, 66 (53%) were published with IEEE and 46 (37%) by ScienceDirect. Fig 4 indicates the breakdown of the trend by publication outlet. Further, the analysis of the publication types revealed most of the reviewed publications were journals (57%) (n = 125).

Similarly, the results were geographically skewed. The affiliations of the corresponding authors at the time of publication were used to extract the geographic originations of the papers. The majority (86%) of the reviewed papers (n = 125) originated from Asia followed by Europe (8%). India (43 of 125) and China (37 of 125) recorded the highest number of publications respectively. Fig 5 shows a summary of the geographical locations of all corresponding authors for the selected papers used for analysis.

The number of citations per paper at the time of this review was also analyzed. Majority (107 of 125) of the papers had 50 or lesser citations and only 8 had 100 or more. S1 Appendix shows the detailed list of the reviewed studies.

4.2 Image steganography techniques and methods

The review analyzed the methods and techniques that have been utilized in image steganography to resist statistical steganalysis attacks. Over 57 image steganography techniques and methods were identified. However, the techniques that have dominated image steganography studies are Modified LSB (M-LSB), LSB Matching (LSB-M), PVD, Genetic Algorithm (GA), GAN, CNN, DL Neural Networks, Hamiltonian Path (HP), Adaptive Edge Detection (AED), RDH, Residue Number System (RNS), DCT, IWT, among many others have been identified in literature as improving the imperceptibility of image steganography. Some of these methods have been implemented alone or sometimes with a combination of two of the methods enumerated. Others combined the methods with LSB and cryptographic protocols such as AES, RSA, and Elliptic Curve Cryptography (ECC) for encryption and decryption to enhance data security. As a result, many combinations of the above-mentioned techniques exist. The techniques and methods showed the capacity to enhance the visual quality of the carrier image and proved to be secure against statistical steganalysis attacks.

Fig 6 shows that GAN (17) is the most adopted technique. This is followed by AED (14). A total of 20 studies implemented a version of LSB comprising M-LSB (4), LSB-M (10), and LSB plus others (6). GA, RDH, and PVD were each implemented in 9 studies. The techniques that were used by less than two publications were grouped as “Others”. Fig 6 gives details of the number of times other methods were utilized. Table 4 also gives a breakdown detail of the trend in publication year and techniques implemented. As already mentioned, the embedding process for image steganography techniques can be classified into three domains ie (i) Spatial Domain-Based Techniques, (ii) Transform Domain-Based Techniques, and (iii) Adaptive Domain-Based Techniques. The review results reveal that spatial domain-based image steganography techniques have attracted more attention, as approximately 43% of all the reviewed papers utilized spatial domain for the secret data embedding process. This is followed by adaptive techniques, where 38% of reviewed papers employed such techniques. The rest of the studies used transform domain image steganography techniques (19%) (See Table 4). Further analysis of the review was conducted to understand the application of the image steganography techniques and the primary embedding domain employed for data hiding. This was necessary to observe the trend of specific techniques within each domain of application.

thumbnail
Fig 6. Image steganography techniques and methods for resisting attacks.

https://doi.org/10.1371/journal.pone.0308807.g006

thumbnail
Table 4. Publication and image steganography embedding domains (2012 to 2023).

https://doi.org/10.1371/journal.pone.0308807.t004

The results as presented in Table 5 show that the spatial domain was the primary data embedding process for M-LSB, LSB-M, PVD, HP, LSB+Others, and AED. Also, almost all papers whose techniques were based on GA, GAN, DL, and CNN utilized the adaptive domain as the primary process of data embedding. Similarly, for DCT and IWT techniques, the transform domain method was mainly used. For RNS and RDH techniques, the domain for data embedding process was varied, whereas most of the other studies employed spatial domain and adaptive domain for the embedding process. The implication is that the spatial domain has gained wide application in use for image steganography, perhaps due to its advantage of high embedding payload capacity. Table 6 shows the trends in the year of publication versus image steganography techniques.

thumbnail
Table 5. Embedding domains verses image steganography techniques.

https://doi.org/10.1371/journal.pone.0308807.t005

thumbnail
Table 6. Image steganography techniques for resisting steganalysis attacks (2012 to 2023).

https://doi.org/10.1371/journal.pone.0308807.t006

4.3 Performance evaluation metrics for image steganography techniques

The implementation of image steganography is aimed at achieving some key objectives. The key objective parameters are high embedding payload capacity, imperceptibility (visual quality of resulting stego-image), robustness (distortion resistance), and security (un-detectability) among others. However, there is a trade-off between the performance evaluation parameters as most of the parameters result in opposite impacts with each other. For instance, techniques proposed to achieve high hiding capacity result in image distortion that ultimately reduces security and data protection. To achieve the objectives of image steganography techniques, various evaluation metrics are utilized. To measure imperceptibility, many studies have used Mean Square Error (MSE) [97], Peak-Signal-to-Noise-Ratio (PSNR) [98,99], Segmented Signal-to-Noise-Ratio (SNRseg) [100] and/or Signal-to-Noise-Ration (SNR) [101]. Also, Pearson Correlation Coefficient (NC) [102], Correlation Factor (r) [103], and Structural Similarity Index Measure (SSIM) [104,105] are used to measure the similarity between the cover image and the stego image to determine the image quality matrix. Bit Error Rate (BER) [106] is often used to measure the image distortion resistance, whereas Regular-Singular (RS) analysis [107,108] has proven effective in analyzing the detectability of the image steganography techniques against steganalysis attacks. Given that high embedding capacity is a key evaluation metric for image steganography techniques, Bits Per Pixel (BPP) is often used [109]. The dominant performance evaluation metrics for the reviewed papers, are PSNR, MSE, NC, SSIM, BPP, and RS analysis. The most used evaluation metrics are discussed below. However, the performance metrics used by each reviewed paper will be reported to ensure standardization and quality metrics comparison.

Imperceptibility is an important criterion in steganography [50]. Distortions between the original cover image (CI) and the resulting stego image (SI) must be relatively low to ensure higher imperceptibility of the image against attacks. Image Quality Measurement (IQM) is a mathematical approach to determining the quality of SI. When a secret message is embedded in the original selected CI, changes are noticed in the pixel values of the CI. Such changes affect the quality of the resulting SI. It is important to measure the changes in pixel values to ensure the SI is imperceptible. PSNR measures the distortion between CI and resulting SI. PSNR is determined using Eq 1 written as [98]: (1)

MAXI. represents maximum oixel value, whereas the MSE is Mean Square Error. The MSE measures of noticeable distortion between CI and SI. MSE is determined using Eq 2 [97]: (2)

M and N represent the image height and width respectively. The lower the values obtained for MSE, the less distorted the difference between the CI and SI. Also, the higher the PSNR value, the higher the visual quality, thus higher imperceptibility.

Robustness of image the steganography technique proves that it is distortion resistant. To ensure that the technique is resistant to distortion, the similarity between the CI and SI is checked to determine whether the image has been distorted after embedding the secret message. SSIM is an important metric to check the structural similarity between the original CI and the resulting SI. The SSIM metric is calculated using Eq 3, and written as [103]: (3) Where c1 = (k1, L)2 and c2 = (k2, L)2. μx and μy are the CI and SI mean intensity. The variances of x and y are represented ð2x and ð2y respectively, whereas ðxy represents the covariance of x and y. the pixel values varying range is denoted by L, and the constant parameters are represented by c1 and c2. k1 and k2 values are always to taken to be 0.01 and 0.03 respectively. The NC also checks the distortion resistance between CI and SI. NC computes the degree correlation between the CI and SI, is determined using mathematical Eq 4 as [102]: (4) Where X is the CI, Y is the SI, Ẋ is the mean pixel intensity values for the CI, and Ȳ is the mean pixel intensity values for the SI. Fundamentally, the image steganography technique aims to avoid statistical steganalysis attacks. As a result, one key parameter in the design is undetectability. Steganalysis attacks can have access to the data in transmission, thereby breaking the data confidentiality parameter. As already mentioned, Regular-Singular (RS) attacks are some of the well-known attacks. RS analysis is therefore performed to ensure the technique developed can resist statistical attacks. RS analysis is defined over three kinds of block flipping. The block flipping are positive flippings (F1), negative flippings (F-1), and Zero (0) flippings (F0). F1, F-1, and F0 become flipping functions and form what is termed a flipped group. The flipped group results from applying the flipping functions on each divided image block pixel value. Eq 5 is for determining the flipped group function [70]. (5) Where M = M (1), M (2), …, M (n) represents the flipped mask, and M (i) has values indicating either 1, 0, or -1. G is regular if f (G) < f (F(G)) otherwise G is singular when f (G)>f (F(G)). The implementation requires first dividing the image into non-overlapping blocks and re-arranging each one of them into a vector G = (X1, X2, X3, …Xn). The blocks are arranged in a zigzag scan order. The discrimination function of the pixel’s correlation is measured using Eq 6 [70]: (6)

The pixel values are represented by x and n is used to represent the number of pixels Also, f represents partial correlation between the adjacent pixels. A smaller f value means a stronger correlation exists between adjacent pixel values. Payload capacity is an important measure for image steganography techniques. An algorithm for image steganography should be able to embed maximum secret messages without noticeable distortion. The overall effect, embedding the maximum payload capacity within the pixel values of the selected CI must be possible without distorting the visual quality of the resulting SI. Basically, the number of secret bits that have been hidden in the CI is the embedding payload capacity, which is calculated using BPP as shown in Eq 7 and written as [108]: (7) Where M and N are the CI cardinality, and embedding capacity (EC) which refers to the number of secret bits that can be embedded within total CI pixel values is determined using Eq 8 [70]: (8)

4.4 Performance metrics analysis

The performance evaluation metrics for all 125 reviewed papers are provided. The analysis covers the techniques employed, strengths, limitations, and results obtained in each reviewed paper. The problems or issues often discussed in image steganography research are diverse. Concerns such as the tradeoffs between embedding capacity and security, statistical attacks against image steganography systems, stego image distortion, low embedding capacity, and low visual image quality of stego images remain some key challenges and issues that are generally raised and discussed within the image steganography domain. As a result, most techniques are proposed to address these challenges. The analysis also covers the issues and problems discussed by the various articles that warranted the proposed techniques and methods. The reviewed papers are grouped according to the primary embedding process adopted. Table 7 covers papers based on Spatial Domain-Based Techniques, Table 8 covers papers based on Transform Domain-Based Techniques, and Table 9 is based on Adaptive Domain-Based Techniques. The evaluation metric indicated in each reviewed paper is reported.

thumbnail
Table 7. Spatial domain-based image steganography techniques.

https://doi.org/10.1371/journal.pone.0308807.t007

thumbnail
Table 8. Transform domain-based image steganography techniques.

https://doi.org/10.1371/journal.pone.0308807.t008

thumbnail
Table 9. Adaptive domain-based image steganography techniques.

https://doi.org/10.1371/journal.pone.0308807.t009

In order to compare the superiority of each of the methods mentioned in Tables 79 over other methods listed and to demonstrate the efficiency of each method through the approved standards (ie Payload Capacity, measured in Bit Per Pixel (BPP) and Imperceptibility using Peak Signal to Noise Ratio (PSNR) and measured in decibel (dB)), a graphical representation is provided. See Fig 7.

thumbnail
Fig 7. Comparison of embedding capacity and security of image steganography techniques.

https://doi.org/10.1371/journal.pone.0308807.g007

4.5 Security analysis of image steganography techniques

The security impact analysis examines the various identified techniques using some key parameters. Section 4.4 has already provided a detailed review of all the 125 publications retained for this study, which are presented along with their strengths and limitations. However, some other key indicators are relevant to determine how the various existing techniques can provide robustness and resistance against attacks and their overall security. This will also enable comparison among the reviewed papers using common standard metrics and parameters. The indicators assessed in this section include the image dataset employed for the experiment, type of data embedding process, data embedding style, secret image type, real-time implementation of a proposed algorithm or technique, application of cryptography protocol (encryption), data compression, values obtained for the PSNR, robustness against steganalysis attacks and the overall security of each technique.

Table 10 provides a detailed comparison of the various existing techniques reviewed which used grayscale images for the experiment whereas Table 11 provides a detailed comparison of the various existing techniques reviewed which used color images. The reviewed articles show that four benchmark datasets consisting of BOSS base, USC-SIPI, Seam Carving Original Q75, and 24 KODAK image Databases have widely been used. These databases contained specific images. The specific image dataset used by each reviewed article is reported. The data-hiding process is divided into spatial, transform, and adaptive domains. The data embedding style is divided into random and sequential. For secret image type, the categorizations are color or grayscale. Yes or no is used to represent whether the respective technique implemented the algorithm in real-time, whether encryption was applied to the secret data, and whether the secret data was compressed. Robustness against steganalysis attacks is divided into high, medium, and low. The specific parameters considered for the robustness are embedding process and style, secret image type, and encryption. Techniques that fully satisfy the evaluation criteria of the researchers considering the key parameters are rated high, those that partially satisfy are rated medium and those that least satisfy are rated low. Security of the reviewed articles is divided into good, average, and low. The overall security is evaluated by taking into consideration all the parameters previously discussed, most importantly PSNR values, Encryption, Real-time implementation, Compression, and embedding process. Other parameters discussed in section 4 (4.4) were also taken into consideration. The techniques that satisfy the maximum parameters as determined by the researchers are rated good. Those that satisfy the parameters partially are rated average, whereas those that least satisfy the key parameters are rated low. To avoid bias, the Delphi Expert Method [110] was adopted to evaluate the studies culminating in the rating provided for the robustness against attacks and overall security. All five researchers acted as experts and evaluated each study against the set of key parameters separately. Thereafter, a meeting was called to consolidate each rating. Where individual opinions differ, the cycle of Delphi was reinitiated until a consensus was reached. The method was designed in such a way that the researchers provided reasoning for individual responses. This was to help confirm the plausibility and strength of the individual researchers’ evaluation.

thumbnail
Table 10. Comparison of various existing image steganography techniques and methods for grayscale images.

https://doi.org/10.1371/journal.pone.0308807.t010

thumbnail
Table 11. Comparison of various existing image steganography techniques and methods for color images.

https://doi.org/10.1371/journal.pone.0308807.t011

4.6 Future scope and research directions for image steganography

The challenge of image steganography remains to achieve high embedding payload capacity while maintaining robustness, distortion resistance, imperceptibility, and overall security (un-detectability). This challenge still exists in many of the reviewed works. The existing systems suffer from low embedding rate, low visual quality of stego image, image distortion, high computational complexity, performance accuracy, low throughput efficiency, as well as detection and modification of secret data. These gaps are largely due to the techniques employed by the existing works. Other identified gaps in most of the existing works are vulnerabilities such as double-frequencies, zero points, and non-accurate detection of statistical steganalysis results. These vulnerabilities have been extensively exploited by steganalysers.

Several of the reviewed works have no layer of protection against unauthorized access to secret data. This is because many of the existing works did not apply cryptographic protocols. Those that implemented cryptography for encryption and decryption are also based on the raster order LSB substitution method which is prone to RS statistical steganalysis attacks [111]. From Tables 10 and 11, only 34 out of the 125 reviewed papers employed encryption (cryptography). This represents 27% of all reviewed papers. The key aim of image steganography technique is to hide the existence of secret data using cover objects (audio, video, image, text, network) [112,113]. Also, for steganography to achieve its aim, the transferred message on the recipient side should be the same as the original message without noticeable suspicion by a third party [114,115]. Embedding secret data into the cover object does not provide the security needed [116118]. This is because, an unauthorized person can read the message when the cover image is attacked, breaking the requirement for confidentiality of the message.

The analysis of the previous works has shown that there is a need to put in place appropriate corrective measures to strike an adequate balance between high payload and security against statistical steganalysis including RS attacks. Thus, techniques that achieve higher payload capacity and better-corrected pixels in ensuring enhanced security protection of secret data in storage and transmission are required. One key challenge of the image steganography embedding process is the secret message size [119]. This challenge could be overcome by employing lossless compression algorithm techniques to achieve higher payload capacity and high embedding rate [120]. From Table 10, only 13% of all the reviewed articles in this study implemented data compression. Compression reduces the secret data size before embedding process begins [121,122].

Clearly, this systematic literature review has shown that the research direction in image steganography has been broad and diverse since 2012. As challenges in image steganography continue, the research domain also continues to evolve. Aside from the traditional methods, researchers have begun experimenting other areas of application for image steganography. For example, Table 4 shows that 9 of the papers adopted other different techniques than the known traditional methods for steganography. This can be inferred that scholars within the image steganography domain are exploring newer and more innovative approaches.

Future research directions could enhance the security and robustness of image steganography applications by:

  • Cryptographic protocols as a layer of security protection. Higher security and robustness in image steganography can be achieved using multiple encryptions to mask and scramble the content of the secret message before embedding. Encrypted embedded secret data have more ability to resist steganalysis.
  • Future research could explore compression and image enhancement techniques to achieve a high payload while maintaining image visual quality. This could help solve the problem of balancing the tradeoff between security and embedding capacity
  • Future research could utilize other novel techniques from domains that have the propensity to achieve computationally efficient, reduced computational complexity, improved performance, and undetectability which are the major issues advocated for by researchers within the image steganography domain. For instance, imperceptibility and security could be improved by employing emerging technologies such as Blockchain Technology [123]. Stego-images containing secret data are often transmitted over unsecured public networks, thereby making the secret data susceptible to many attacks including man-in-the-middle attacks, tampering, and eavesdropping [124,125].
  • Blockchain technology could be employed in image steganography to ensure stego-images are more secure and authenticated [114]. This is because, blockchain has immutable properties, easy traceability, tracking capabilities, and transparency [50]. In addition, future research could rely on emerging artificial intelligence and machine learning power technologies such as ChatGPT to provide robust techniques against steganographic attacks.

5. SLR results discussion and implication

The review focused on providing evidence on image steganography techniques that have been designed to resist statistical steganalysis attacks. The review has shown that several such techniques and methods, with the capability to withstand complex attacks, exist. This systematic literature review was based on key questions that provided a foundation for the review. The SLR results are provided as summarized answers to the study’s research questions. Table 12 provides the questions and a summary of the systematic literature review results.

thumbnail
Table 12. Answers to SLR questions and summary of review results.

https://doi.org/10.1371/journal.pone.0308807.t012

5.1 Research trends in image steganography techniques

The review reveals an interesting result for image steganography research. Intriguingly, research on image steganography is skewed in terms of publication trends. The skewness in the publication trends for image steganography can be seen in analysis concerning the year of publication, publication outlets, country of origin of the corresponding author, and application domains for image steganography. The research shows that despite the growing interest in the research field in image steganography, research in the area took a sharp nosedive in 2020, but rather experienced astronomical expansion from 2021 to 2023. Approximately half of the papers studied in this research were published from 2021 to 2023. Indeed, cyber-attacks on organizations and individual data due to inherent vulnerabilities in network security protection were expanding [126], even before 2020. This might have contributed to the interest of researchers in this domain to find solutions to the ever-increasing threat. The volume of research conducted in this domain post-COVID-19 is not surprising, as the Coronavirus (COVID-19) pandemic resulted in an increased number and range of cyber-attacks resulting in personal and organizational data breaches and compromises [127]. The exponential increase in the research domain could be a direct response to the increasing trend of cyber-attacks during the COVID and the need for companies to work remotely as a means of cutting costs and making use of investments in technology during the pandemic. In terms of publication outlets, it is interesting to note that more than half of the articles reviewed were published in IEEE. The implication is that IEEE has become the destination of choice for researchers publishing studies on image steganography. This finding corroborates the study of Kaur et al., [50] where most of the reviewed papers were also published in IEEE. This brings to the fore the need to address the dominance in the publication of such crucial research areas by a particular publication house and expand the domain in other publication outlets. Although there are several publication outlets that publish research on image steganography, such outlets were dully not represented in this study. Given that image steganography techniques for resisting steganalysis have become a growing area of research interest, other publication outlets may put in place measures to attract researchers. This could include special issues concerning the domain and putting in place incentives to attract researchers. Surprisingly, despite the growing cases of cybercrimes in Sub-Sahara Africa [128], the interest of researchers in this geographic location is low. It must, however, be mentioned that researchers in Sub-Saharan Africa have begun showing interest in publishing in this area, as evidenced by a recent publication [70]. Developing research capabilities including collaboration with external scholars particularly those in India and China could ameliorate the low level of research by African scholars in this domain. The digital divide in Africa is growing. Internet penetration in Africa is also expanding, and as a result, digital crimes have increased. Developing research capabilities and acquiring the requisite technical knowledge to research image steganography techniques could prevent many of the data breaches and cyber-attacks as well as save African-based organizations from data breaches and compromises.

5.2 Image steganography techniques for resisting steganalysis

As observed in Fig 6 and Table 4, Generative Adversarial Neural Networks (GAN) is the most preferred image steganography technique for resisting steganalysis attacks. This finding supports arguments by Liu et al., [129] that GAN has seen increasing achievement in the field of image steganography, computer vision, and natural language processing. From the review, the application of GAN in image steganography witnessed exponential growth between 2018 and 2022. GAN was first proposed in 2014 [130] and has seen great application in many fields of Computer Science. In image steganography, it improves security by resisting cover modification, enhances the cover selection and synthesis processes, and achieves overall security protection against steganalysis attacks. The security capabilities of GAN are higher than other adaptive methods and traditional spatial and transform domain methods [131]. Quite interestingly, despite the complexity associated with GAN-based image steganography approaches, the technique has seen overwhelming applications. The increase in the use of GAN processes is attributed to recent developments in deep learning-based steganalysis [132134]. GAN has the capability to resist state-of-the-art deep learning-based steganalysis [135]. GAN also can be used to improve the security performance of image steganography techniques in other domains including spatial domain applications. These capabilities make GAN a considerable option for image steganography regardless of the complexity associated with it.

The study further shows that machine learning-based algorithms are recently dominating image steganography research. This confirms the argument by Hussain et al., [82] on the growth of machine learning techniques including GAN, DL, CNN, and GA. These machine learning-based algorithms have emerged as powerful tools for image steganography capable of resisting steganalysis attacks. Subramanian et al, [131] argue that machine learning-based algorithms will continue to see greater applications in future image steganography works. DL, GA, and CNN like other machine learning algorithms including GAN are great techniques for fooling steganalysis and preventing them from detecting secret images hiding in cover images. In addition to machine learning-based algorithms, the study reveals that researchers are exploring many other areas of application for image steganography. At least 9 of the reviewed articles were based on other methods rather than known traditional steganography methods or machine learning methods.

The overall implication is that previously preferred image steganography techniques particularly the least significant bit (LSB) insertion algorithms are becoming unpopular among data protection and information security researchers. This finding supports the assertion by Subramanian et. al., [131] that traditional algorithms like LSB are now receiving less attention in image steganographic applications. Between the spatial domain and transform domain, algorithms based on the spatial domain were more. This finding supports arguments by Hussain et al., [82] that the spatial domain methods for secret data embedding are more popular than the transform domain due to the easiness of embedding and extraction of data in the spatial domain. The spatial domain however suffers from less robustness. The major spatial domain methods include LSB, LSB-M, AED, PVD, and PH. The major transform domain methods identified were DCT and IWT techniques such as RDH and RNS however saw application across the various embedding domain processes (ie spatial, transform, and adaptive domains). Indeed, LSB is considered the fundamental and conventional steganography method capable of hiding a larger secret message in a cover image without noticeable visual distortions. Over time, different variations of LSB have been developed. The disadvantage of LSB is that an increase in payload reduces the overall visual quality making it an easy target for attacks. Given the challenges of LSB, Wu and Tsai [136] proposed PVD using the difference between two neighboring pixels to determine the number of secret bits to be embedded. Since then, many steganographic methods have been proposed to improve the initial PVD method. From the study, it can further be observed that AED is one of the prominent embedding strategies in the spatial domain. AED schemes have the capability to maintain minimum visual quality and are noted to provide higher imperceptibility when compared to other spatial domains [137]. From Table 4, AED recorded the second highest techniques for image steganography. Different hybrid edge-based methods including combining canny edge and fuzzy edge adaptors [138,139] were observed in the articles reviewed for this study. The study has revealed varied techniques for protecting data against attacks. However, more research investigations are required to identify how emerging technologies including artificial neural networks (ANN) could be explored to provide harmonized security capabilities against statistical steganalysis attacks.

5.3 Security performance of image steganography against attacks

The systematic review results revealed that the most significant contribution of steganography techniques is resistance against statistical detection analysis attacks such as Regular-Singular (RS) and Histogram analysis attacks. Adaptive embedding techniques such as GAN, GA, and CNN and transform domain techniques including DCT and IWT methods were hard to expose to such statistical detection analysis attacks. However, spatial domain techniques including LSB and PVD were easy to expose. Most of the studies reviewed reported improvement against RS and histogram analysis attacks, indicating continued research improvement in overcoming these types of attacks. Another key significance of existing steganographic techniques is resistance against non-structural detection attacks. Machine learning-based algorithms proved difficult to detect by non-structural detection attacks, whereas spatial domain and transform domain methods were easily detectable. In terms of geometric attacks, it was observed that adaptive embedding techniques such as GAN and CNN and techniques-based transform domain methods were resistant and hard to geometric attacks while spatial domain methods were vulnerable to such attacks.

The visual quality of adaptive-based methods and the undetectability of secret messages were high and robust against noise cropping and less prone to image rotation. However adaptive methods have limited embedding capacity. Even though spatial domains such as LSB, LSB-M, and PVD have higher payload capacity and visual quality, they are highly prone to noise cropping, and rotation. Overall, most of the reviewed studies reported higher SI visual quality, an important measure in ensuring the transmission of secret data is not detectable by the HVS. Transform domains such as DCT and IWT offered higher security considerations than spatial domain methods but were less effective when compared to adaptive embedding methods. Only a few of the techniques have also been implemented in a real-time application. When evaluation of image steganography is done using capacity, traditional embedding algorithms including the various variations of LSB offer higher embedding capacity than machine learning-based techniques such as CNN, GAN, and DL.

Despite the notable progress achieved in image steganographic techniques, computational complexity and time complexity were observed to be a major challenge in all the reviewed papers. Even though computational complexity is a generic challenge as most studies indicated, adaptive embedding techniques such as CNN, DL, and GAN were reported to have higher computational complexity results than both spatial domain and transform domain methods. This finding is, however, not surprising given that most of the adaptive embedding approaches were based on machine learning techniques. This is because, one key challenge associated with machine learning algorithms has been identified to be computational complexity [140,141]. The challenge of computational complexity is noted to significantly have a direct impact on image steganography techniques with respect to computational speed thereby having a tremendous impact on the performance of emerging image steganography applications. This notwithstanding, recent studies have reported measures to improve the computational complexity and time accuracy of machine learning algorithms [142]. This has occasioned the growing use of genetic algorithms (GA) in image steganography applications [70], as GA has been noted as reducing the computational complexities of machine learning-based algorithms.

From Tables 10 and 11, the results from the systematic review analysis have shown the positive effects of combining steganography and cryptography. The analysis further shows that image steganography studies that had implemented cryptography were rated high for robustness and good for overall security. The combined effects of cryptography and steganography provide an additional layer of protection for the privacy system against many security attacks [143,144]. Although the combination is noted as an extra payload on the time and space complexities of the application, it offers comparative advantages in terms of robustness, confidentiality, and privacy [145]. However, several techniques have recently been introduced to reduce the computational cost performance associated with the art of combining steganography and cryptography.

From Fig 7, Modified Least Significant Bits (M-LSB) had the highest PSNR value indicating the highest imperceptibility. This was obtained for RS 108. This was followed by RS111 with a PSNR value of 85, which utilized the LSB technique. For embedding capacity, the highest capacity recorded among the reviewed articles was 8.88BPP for the PVD technique. This was obtained in RS48. This was followed by RS26, a generative adversarial network (GAN) which obtained 5.61BPP. A careful examination of Tables 79 shows that Spatial domain techniques recorded the highest imperceptibility outcome. However, spatial domains are susceptible to steganalysis attacks. The average highest embedding capacity was recorded in the spatial domain and transform domain techniques. Genetic Algorithm (GA) and GAN applications under the adaptive domains showed the best results for balancing embedding capacity and robustness. This explains the growing use of GAN and GA algorithms. Even though, the high-capacity trade-off to security and robustness improvement remains a challenge [146148], GAN, GA, and other emerging technologies such as generative artificial intelligence (AI) have the potential to overcome the challenge.

6. Conclusion, research validity, and limitation

The paper provided a systematic literature review of image steganography techniques that can withstand statistical steganalysis attacks. To the best of the Authors’ knowledge and understanding of the existing literature, this systematic review is the first to have considered the entire spectrum of image steganography methods and techniques and their application in resisting steganalysis attacks. The study sampled 125 articles from four reputable electronic databases comprising ACM, IEEE, Science Direct, and Wiley. Using PRISMA for literature mapping, the articles were synthesized and analyzed using quantitative and qualitative methods. Trends in publication, techniques and methods, performance evaluation metrics, and the security impact of image steganography techniques against steganalysis were discussed. Extensive comparisons were drawn among existing techniques to evaluate their merits and limitations. Various future research directions in image steganography have been provided to help researchers who may want to consider emerging technologies to enhance data protection and security.

Research validity is an important component in all studies, as biases have the potential to negatively impact the study outcome. The possible biases and the threat to the validity of this research emanate from the potential omission of articles in the selection and data extraction processes. Various databases and journals publish research on cryptography and steganography, which may contain relevant articles that meet the inclusion criteria for the study. However, the article selection was limited to four databases only. It therefore becomes difficult to generalize the study findings. Nonetheless, the use of PRISMA guidelines for the article selection, coupled with the developed protocol by the authors which guided the various processes of data extraction significantly reduced the number of omitted articles and ultimately eliminated possible biases associated with the research validity. Also, a preliminary search conducted on Google Scholar, Citeseer, and SCOPUS identified, IEEE Explore, ACM Digital Library, ScienceDirect, and Wiley Online as the most appropriate databases containing many of the studies on image steganography techniques. The quality assessment metrics used for the data extraction further reduced biases. The keywords developed were also aimed at reducing biases. Ultimately, the objective was to ensure the articles selected were of good quality.

In conclusion, it was observed that GAN has become the most preferred image steganography technique, and machine learning-based algorithms such as DL, CNN, and GA are recently dominating image steganography research. The implication is that previously preferred traditional techniques such as LSB, DCT, and IWT algorithms are receiving less attention in image steganography. Future research could explore emerging technologies such as blockchain technology and artificial neural networks to strike an adequate balance between imperceptibility, robustness, and enhanced security for data protection on one hand, and high embedding payload capacity on the other hand.

Supporting information

S1 Appendix. Detailed list of reviewed studies (RS).

https://doi.org/10.1371/journal.pone.0308807.s001

(DOCX)

S2 Appendix. PRISMA 2020 checklist for the study.

https://doi.org/10.1371/journal.pone.0308807.s002

(DOCX)

S3 Appendix. Data sources retrieved from electronic databases.

https://doi.org/10.1371/journal.pone.0308807.s003

(XLSX)

References

  1. 1. Apau R., Koranteng F. N., and Gyamfi S. A, “Cyber-crime and its effects on E-commerce technologies,” Journal of Information, vol. 5, no. 1, pp. 39–59, Aug. 2019,
  2. 2. Park H. S., “Technology convergence, open innovation, and dynamic economy,” Journal of Open Innovation: Technology, Market, and Complexity 2017, vol. 3, no. 4, p. 24, Nov. 2017,
  3. 3. Aslam S., “80+ Facebook Statistics You Need to Know in 2023—Omnicore.” Accessed: Jun. 18, 2023. [Online]. Available: https://www.omnicoreagency.com/facebook-statistics/.
  4. 4. Chewning L. V., Lai C. H., and Doerfel M. L., “Organizational Resilience and Using Information and Communication Technologies to Rebuild Communication Structures,” Management Communication Quarterly, vol. 27, no. 2, pp. 237–263, May. 2013,
  5. 5. Waseso B. M. P., and Setiyanto N. A., “Web phishing classification using combined machine learning methods,” Journal of Computing Theories and Applications, vol. 1, no. 1, pp. 11–18, Aug. 2023,
  6. 6. Seh A. H., Zarour M., Alenezi M., Sarkar A. K., Agrawal A., Kumar R., et al, “Healthcare Data Breaches: Insights and Implications,” Healthcare, vol. 8, no. 2, p. 133, May 2020, pmid:32414183
  7. 7. Wong W. P., Tan H. C., Tan K. H. and Tseng M. L., “Human factors in information leakage: mitigation strategies for information sharing integrity,” Industrial Management and Data Systems, vol. 119, no. 6, pp. 1242–1267, Aug. 2019,
  8. 8. Apau R., and Koranteng F. N., “Impact of Cybercrime and Trust on the Use of E-Commerce Technologies: An Application of the Theory of Planned Behavior,” International Journal of Cyber Criminology, vol 13, no. 2, pp. 228–254, Jul. 2020,
  9. 9. Ventures Cybersecurity, “Cybercrime To Cost The World $10.5 Trillion Annually By 2025,” Cybercrime Magazine, Sausalito, Nov. 2020. [Online]. Available: https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ (Accessed 11 April 2024).
  10. 10. Song V., “Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords,” Gizmodo, 2019. Accessed: Feb. 2, 2023. [Online]. Available at https://gizmodo.com/mother-of-all-breaches-exposes-773-million-emails-21-m-1831833456.
  11. 11. Thales C.P., “2022 Thales Data Threat Report.” 2022. Accessed: May 16, 2023. [Online]. Available at https://cpl.thalesgroup.com/2022/data-threat-report.
  12. 12. Drapkin A., “Data Breaches That Have Happened in 2022 and 2023 So Far,” Tech.co, 2023. Accessed: Feb 2, 2023. [Online]. Available at https://tech.co/news/data-breaches-updated-list.
  13. 13. Nallainathan S., “Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic,” International Journal of Science and Research, vol. 10, no. 4, pp. 1–6, Apr. 2021,
  14. 14. Bouveret A., “Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment,” IMF Working Papers, vol. 2018, no. 143, Jun. 2018,
  15. 15. Amsaveni A., and Vanathi P. T., “A comprehensive study on image steganography and steganalysis techniques,” International Journal of Information and Communication Technology, vol. 7, no. 4–5, pp. 406–424, Jul. 2015,
  16. 16. Qadir A. M., and Varol N., “A review paper on cryptography,” 7th International Symposium on Digital Forensics and Security, ISDFS 2019, pp. 1–6, Jun. 2019,
  17. 17. Wu Z., Guo J., Zhang C., and Li C., “Steganography and Steganalysis in Voice over IP: A Review,” Sensors 2021, vol. 21, no. 4, p. 1032, Feb. 2021, pmid:33546240
  18. 18. Sahu A. K. and Sahu M., “Digital image steganography and steganalysis: A journey of the past three decades,” Open Computer Science, vol. 10, no. 1, pp. 296–342, Jan. 2020,
  19. 19. Naveenkumar R., Sivamangai N. M., Napolean A., and Sridevi Sathyapriya S., “Enhancing Encryption Security Against Cypher Attacks,” Homomorphic Encryption for Financial Cryptography, pp. 125–155, Aug. 2023, Springer, Cham,
  20. 20. Stallings W. and Brown L., Computer security: principles and practice. 2017. Fourth Edition. Upper Saddle River: Pearson Education.
  21. 21. El Mrabet N. and Joye M., “Guide to pairing based cryptography,” 2017, Accessed: Sep. 22, 2023. [Online]. Available: https://hal.science/hal-01579628.
  22. 22. Girdhar A. and Kumar V., “Comprehensive survey of 3D image steganography techniques,” IET Image Process, vol. 12, no. 1, pp. 1–10, Jan. 2018,
  23. 23. Khalid M., Rahmani I., Arora K., Pal N. and Scholar M. T., “A Crypto-Steganography: A Survey,” IJACSA) International Journal of Advanced Computer Science and Applications, vol. 5, no. 7, pp. 149–155, May. 2014, 6d993a6490fe999c72e04d57bf5422db8883f8d1.
  24. 24. Mahto D. and Yadav D.K., “RSA and ECC: A Comparative Analysis,” International Journal of Applied Engineering Research, vol. 12, pp. 9053–9061, Oct. 2017.
  25. 25. Pramanik S., Bandyopadhyay S. K., and Ghosh R., “Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts,” 2nd International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2020—Conference Proceedings, pp. 665–669, Mar. 2020,
  26. 26. Rasras R., Alqadi Z., Sara M.A., Rasras R. J., Alqadi Z. A., Rasmi M., et al, “A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages,” Technology & Applied Science Research, vol. 9, no. 1, pp. 3681–3684, Feb. 2019,
  27. 27. Din R., Utama S., and Mustapha A., “Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 11, no. 2, pp. 747–754, Aug. 2018,
  28. 28. Poornima R. and Iswarya R. J., “An overview of digital image steganography,” International Journal of Computer Science & Engineering Survey (IJCSES), vol. 4, no. 1, pp. 23–31, Feb. 2013,
  29. 29. Lou D. C., and Hu C. H., “LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis,” Inf Sci (N Y), vol. 188, pp. 346–358, Apr. 2012,
  30. 30. Bhattacharyya D. and Banerjee D. I., “A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier CFC: Big Data Security View project Cloud computing View project,” Journal of global research in computer science, vol. 2, no. 4, pp. 1–16, May. 2011.
  31. 31. Febryan A., Purboyo T. W., & Saputra R. E., “Steganography Methods on Text, Audio, Image and Video: A Survey,” International Journal of Applied Engineering Research, vol. 12, no. 21, pp. 10485–10490, Apr. 2017.
  32. 32. Chanu Y. J., Singh K. M., & Tuithung T., “Image steganography and steganalysis: A survey,” International Journal of Computer Applications, vol. 52, no. 2, pp. 975–8887, Aug. 2012.
  33. 33. Kaur M. and Kaur G., “Review of Various Steganalysis Techniques,” International journal of computer science and information technologies, vol. 5, no. 2, pp. 1744–1747, Jan. 2014.
  34. 34. Shehab D. A. and Alhaddad M. J., “Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research,” Symmetry 2022, vol. 14, no. 1, p. 117, Jan. 2022,
  35. 35. Tasheva A., Tasheva Z., and Nakov P., “Image based steganography using modified LSB insertion method with contrast stretching,” ACM International Conference Proceeding Series, vol. Part F132086, pp. 233–240, Jun. 2017,
  36. 36. Shelke F. M., Dongre A. A., and Soni P. D., “Comparison of different techniques for Steganography in images,” International Journal of Application or Innovation in Engineering & Management, vol. 3, no. 2, 3(2), pp.171–176, Feb. 2014.
  37. 37. Apau R. and Adomako C., “Design of Image Steganography based on RSA Algorithm and LSB Insertion for Android Smartphones,” Int J Comput Appl, vol. 164, no. 1, pp. 13–22, Apr. 2017,
  38. 38. Zhang X., Peng F., and Long M., “Robust Coverless Image Steganography Based on DCT and LDA Topic Classification,” IEEE Trans Multimedia, vol. 20, no. 12, pp. 3223–3238, Dec. 2018,
  39. 39. Liu T. Y. and Tsai W. H., “A new steganographic method for data hiding in microsoft word documents by a change tracking technique,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 24–30, Mar. 2007,
  40. 40. Deshmukh P. V., Kapse A. S., Thakare V. M., and Kapse A. S., “High-capacity reversible data hiding in encrypted images using multi-MSB data hiding mechanism with elliptic curve cryptography,” Multimedia Tools and Applications, vol. 82, no. 18, pp. 28087–28115, Jul. 2023,
  41. 41. Laskar S. A. and Hemachandran K., “A Review on Image Steganalysis techniques for attacking Steganography,” International Journal of Engineering Research and Technology, vol. 3, no. 1, pp. 3400–3410, Jan. 2014,
  42. 42. Kaur M., Kumar V., and Singh D., “An efficient image steganography method using multiobjective differential evolution,” Digital Media Steganography: Principles, Algorithms, and Advances, pp. 65–79, Jan. 2020,
  43. 43. Luo W., Huang F., and Huang J., “Edge adaptive image steganography based on lsb matching revisited,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201–214, Jun. 2010,
  44. 44. Chhabra A., Woeden T., Singh D., Rakhra M., Dahiya O., and Gupta A., “Image Steganalysis with Image decoder using LSB and MSB Technique,” Proceedings of 3rd International Conference on Intelligent Engineering and Management, ICIEM 2022, pp. 900–905, Apr. 2022,
  45. 45. AlFaqawi L., AbuHaya M., & Barhoom T., “Alpha channel-Based Indicator for Robustness Forward/Backward LSB Steganography,” Proceedings—2021 Palestinian International Conference on Information and Communication Technology, PICICT 2021, pp. 163–168, Sep. 2021,
  46. 46. Braci S., Delpha C. and Boyer R., “How quantization based schemes can be used in image steganographic context,” Signal Processing: Image Communication, vol. 26, no. 8–9, pp. 567–576, Oct. 2011,
  47. 47. Hong W., Chen T. S., and Luo C. W., “Data embedding using pixel value differencing and diamond encoding with multiple-base notational system,” Journal of Systems and Software, vol. 85, no. 5, pp. 1166–1175, May. 2012,
  48. 48. Wu D. C. and Tsai W. H., “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, no. 9–10, pp. 1613–1626, Jun. 2003,
  49. 49. Zhang X. and Wang S., “Steganography using multiple-base notational system and human vision sensitivity,” IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67–70, Jan. 2005,
  50. 50. Kaur S., Singh S., Kaur M., and Lee H. N., “A Systematic Review of Computational Image Steganography Approaches,” Archives of Computational Methods in Engineering, vol. 29, no. 7, pp. 4775–4797, Nov. 2022,
  51. 51. Solak S. and Tezcan G. A “New Dual Image Based Reversible Data Hiding Method Using Most Significant Bits and Center Shifting Technique.,” Applied Sciences, vol. 12, no. 21, p. 10933, Oct. 2022,
  52. 52. Abdirashid A. M., Solak S., & Sahu A. K. (2022). Data Hiding Based on Frequency Domain Image Steganography. European Journal of Science and Technology, vol. 42, pp. 71–76, Oct. 2022,
  53. 53. Chen W. Y., “Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation,” Applied Mathematics and Computation, vol. 185, no. 1, pp. 432–448, Feb. 2007,
  54. 54. Hassaballah M., Hameed M. A., Awad A. I., & Muhammad K., “A Novel Image Steganography Method for Industrial Internet of Things Security,” IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7743–7751, Nov. 2021,
  55. 55. Narasimmalou T. and Allen J. R., “Optimized discrete wavelet transform based steganography,” Proceedings of 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies, ICACCCT 2012, pp. 88–91, Aug. 2012,
  56. 56. Huang F., Huang J., and Shi Y. Q., “New channel selection rule for JPEG steganography,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1181–1191, May. 2012,
  57. 57. Apau R., Hayfron-Acquah J. B., & Twum F., “Enhancing data security using video steganography, RSA and Huffman code algorithms with LSB insertion,” International Journal of Computer Applications, vol. 143, no. 4, pp. 975–8887, Sep. 2016,
  58. 58. Kaur A., Kaur R., and Kumar N., “A Review on Image Steganography Techniques,” International Journal of Computer Applications, vol. 123, no. 4, pp. 975–8887, Jan. 2015.
  59. 59. Karthika P., Babu R. G, and Jayaram K., “Biometric based on steganography image security in wireless sensor networks,” Procedia Computer Science, vol. 67, pp. 1291–1299, Jan. 2020,
  60. 60. Oduguwa T. and Arabo A., “Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics,” Journal of Cybersecurity and Privacy, vol. 4, no. 2, pp. 278–297, May. 2024,
  61. 61. Bernal-Romero J. C, Ramirez-Cortes J. M, Rangel-Magdaleno J. D, Gomez-Gil P, Peregrina-Barreto H, and Cruz-Vega I., “A review on protection and cancelable techniques in biometric systems,” IEEE Access, vol. 11, pp. 8531–8568, Jan. 2023,
  62. 62. Lu S. Y., and Lin C. Y., “A Robust Coverless Image Steganography Method Based on Face Recognition and Camouflage Image,” In 2024 4th Asia Conference on Information Engineering (ACIE), pp. 52–57, Jan. 2024,
  63. 63. Kumar V., and Sharma S., “Steganography-based facial re-enactment using generative adversarial networks,” Multimedia Tools and Applications, vol. 83, no. 3, pp. 7609–7630, Jan. 2024,
  64. 64. Juarez-Sandoval O., Cedillo-Hernandez M., Sanchez-Perez G., Toscano-Medina K., Perez-Meana H., & Nakano-Miyatake M., “Compact image steganalysis for LSB-matching steganography,” Proceedings—2017 5th International Workshop on Biometrics and Forensics, IWBF 2017, May 2017,
  65. 65. Rathika L, Loganathan B, Scholar MP, Nadu T, and Nadu T., “Approaches and methods for steganalysis–A survey,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 6, no. 6, pp. 433–438, Jun. 2017.
  66. 66. Westfeld A. and Pfitzmann A., “Attacks on steganographic systems breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools–and some lessons learned,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1768, pp. 61–76, 2000,
  67. 67. Provos N., “Defending Against Statistical Steganalysis,” in 10th USENIX Security Symposium (USENIX Security 01), pp. 323–336, 2001. Accessed: May 23, 2023. [Online]. Available at https://www.usenix.org/legacy/events/sec01/full_papers/provos/provos_html/.
  68. 68. Dumitrescu S., Wu X., and Wang Z., “Detection of LSB steganography via sample pair analysis,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2578, pp. 355–372, 2003,
  69. 69. Fridrich J., Goljan M., and Du R., “Reliable detection of LSB steganography in color and grayscale images,” Proceedings of the ACM International Multimedia Conference and Exhibition, no. II, pp. 27–30, Mar. 2001,
  70. 70. Apau R., Hayfron-Acquah J.B., Asante M. and Twum F., “A Multilayered Secure Image Steganography Technique for Resisting Regular-Singular Steganalysis Attacks Using Elliptic Curve Cryptography and Genetic Algorithm” In International Conference on ICT for Sustainable Development, Vol. 754, pp. 427–439, Aug. 2023, Springer Nature Singapore, https://doi.org/10.1007/978-981-99-4932-8_39
  71. 71. Manoharan S., Master A., and Speidel U., “Complexity-based steganalysis,” in 2014 International Symposium on Information Theory and its Applications, pp. 40–44, May. 2014.
  72. 72. Xia Z., Wang X., Sun X., Liu Q., & Xiong N., “Steganalysis of LSB matching using differences between nonadjacent pixels,” Multimedia Tools Applications, vol. 75, no. 4, pp. 1947–1962, Feb. 2016,
  73. 73. Kulkarni Y. and Gorkar A., “Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis,” Proceedings—2020 IEEE International Conference on Big Data, Big Data 2020, pp. 2309–2317, Dec. 2020,
  74. 74. Ahmed I. T., Hammad B.T., and Jamil N., “Image Steganalysis based on Pretrained Convolutional Neural Networks,” 2022 IEEE 18th International Colloquium on Signal Processing and Applications, CSPA 2022—Proceeding, pp. 283–286, Apr. 2022, https://doi.org/10.1109/CSPA55076.2022.9782061
  75. 75. Aljarf A., Zamzami H., and Gutub A., “Integrating machine learning and features extraction for practical reliable color images steganalysis classification,” Soft Computing, vol. 27, no. 19, pp. 13877–13888, Oct. 2023,
  76. 76. Hemalatha J., Sekar M., Kumar C., Gutub A., and Sahu A. K., “Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier,” Journal of Information Security and Applications, vol. 76, p.103541, Aug. 2023,
  77. 77. Aljarf A., Zamzami H., and Gutub A., “Is blind image steganalysis practical using feature-based classification?,” Multimedia Tools and Applications, vol. 83, no. 2, 4579–4612, Jan. 2024,
  78. 78. Ashwin P., Wieczorek S., Vitolo R., and Cox P., “Tipping points in open systems: bifurcation, noise-induced and rate-dependent examples in the climate system,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 370, no. 1962, pp. 1166–1184, Mar. 2012, pmid:22291228
  79. 79. Subhedar M. S. and Mankar V. H., “Current status and key issues in image steganography: A survey,” Computer Science Review, vol. 13–14, no. C, pp. 95–113, Nov. 2014,
  80. 80. Kadhim I. J, Premaratne P., Vial P. J., and Halloran B., “Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research,” Neurocomputing, vol. 335, pp. 299–326, Mar. 2019,
  81. 81. Mandal P. C., Mukherjee I., and Chatterji B. N., “High capacity steganography based on IWT using eight-way CVD and n-LSB ensuring secure communication,” Optik (Stuttg), vol. 247, p. 167804, Dec. 2021,
  82. 82. Hussain M., Wahab A. W. A., Idris Y. I. B., Ho A. T., & Jung K. H., “Image steganography in spatial domain: A survey,” Signal Processing: Image Communication, vol. 65, pp. 46–66, Jul. 2018,
  83. 83. Girdhar A. and Kumar V., “Comprehensive survey of 3D image steganography techniques,” IET Image Processing, vol. 12, no. 1, pp. 1–10, Jan. 2018,
  84. 84. Meng R., Cui Q., and Yuan C., “A Survey of Image Information Hiding Algorithms Based on Deep Learning,” CMES—Computer Modeling in Engineering and Sciences, vol. 117, no. 3, pp. 425–454, 2018,
  85. 85. Qin J., Luo Y., Xiang X., Tan Y., & Huang H., “Coverless image steganography: A survey,” IEEE Access, vol. 7, pp. 171372–171394, Nov. 2019,
  86. 86. Puteaux P., Ong S., Wong K., & Puech W., “A survey of reversible data hiding in encrypted images–The first 12 years,” Journal of Visual Commun Image Representation, vol. 77, p. 103085, May 2021,
  87. 87. Aslam M. A., Rashid M., Azam F., Abbas M., Rasheed Y., Alotaibi S. S., et al, “Image Steganography using Least Significant Bit (LSB)-A Systematic Literature Review,” Proceedings of 2022 2nd International Conference on Computing and Information Technology, ICCIT 2022, pp. 32–38, 2022,
  88. 88. Kitchenham B, and Charters S., “Guidelines for performing Systematic Literature Reviews in Software Engineering,” 2007. Keele Univ., Univ. Durham, Durham, U.K., EBSE Tech. Rep. EBSE-2007. Accessed: Apr 21, 2023. [Online]. Availabel at https://www.researchgate.net/profile/Barbara-Kitchenham/publication/302924724_Guidelines_for_performing_Systematic_Literature_Reviews_in_Software_Engineering/links/61712932766c4a211c03a6f7/Guidelines-for-performing-Systematic-Literature-Reviews-in-Software-Engineering.pdf.
  89. 89. Mohsin A. H., Zaidan A. A., Zaidan B. B., Albahri O. S., Albahri A. S., Alsalem M. A., et al, “Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions,” Computer Standard and Interfaces, vol. 64, pp. 41–60, May 2019,
  90. 90. Harie Y., Gautam B. P., and Wasaki K., “Computer Vision Techniques for Growth Prediction: A Prisma-Based Systematic Literature Review,” Applied Sciences 2023, vol. 13, no. 9, p. 5335, Apr. 2023,
  91. 91. Alshehri F. and Muhammad G., “A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare,” IEEE Access, vol. 9, pp. 3660–3678, May. 2021,
  92. 92. Page M. J., McKenzie J. E., Bossuyt P. M., Boutron I., Hoffmann T. C., Mulrow C. D., et al, “The PRISMA 2020 statement: An updated guideline for reporting systematic reviews,” International Journal of Surgery, vol. 88, p. 105906, Apr. 2021, pmid:33789826
  93. 93. Brereton P., Kitchenham B. A., Budgen D., Turner M., and Khalil M, “Lessons from applying the systematic literature review process within the software engineering domain,” Journal of Systems and Software, vol. 80, no. 4, pp. 571–583, Apr. 2007,
  94. 94. Basili V. R., Caldiera G., and Rombach H. D., “The goal question metric approach,” Encyclopedia of Software Engineering, vol. 2, pp. 528–532, Jan. 1994,
  95. 95. Lun Y. Z., D’Innocenzo A., Smarra F., Malavolta I., and Di Benedetto M. D., “State of the art of cyber-physical systems security: An automatic control perspective,” Journal of Systems and Software, vol. 149, pp. 174–216, Mar. 2019,
  96. 96. Wiafe I., Koranteng F. N., Obeng E. N., Assyne N., Wiafe A., & Gulliver S. R., “Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature,” IEEE Access, vol. 8, pp. 146598–146612, Oct. 2020,
  97. 97. Sajasi S., and Moghadam A. M. E., “An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method,” Applied Soft Computing, vol. 30, pp. 375–389, May 2015,
  98. 98. Chefranov A. G. and Öz G., “Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images,” Journal of Information Security and Applications, vol. 70, p. 103314, Nov. 2022,
  99. 99. Yadav G. S. and Ojha A., “Hamiltonian path based image steganography scheme with improved imperceptibility and undetectability,” Appl Soft Comput, vol. 73, pp. 497–507, Dec. 2018,
  100. 100. Apau R. and Gyamfi S. A., “Data Hiding in Audio Signals using Elliptic Curve Cryptography, Huffman Code Algorithm and Low-Bit Encoding,” International Journal of Computer Applications, vol. 180, no. 39, pp. 24–34, May. 2018,
  101. 101. Hemalatha S., Acharya U. D., and Renuka A., “Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image,” Procedia Computer Science, vol. 47, no. C, pp. 272–281, Jan. 2015,
  102. 102. Yadav S., “Correlation analysis in biological studies,” Journal of the Practice of Cardiovascular Sciences, vol. 4, no. 2, p. 116, Jan. 2018,
  103. 103. Sun Y. and Liu F., “Selecting cover for image steganography by correlation coefficient,” 2nd International Workshop on Education Technology and Computer Science, ETCS 2010, vol. 2, pp. 159–162, 2010,
  104. 104. Kumar N., Hoffmann N., Oelschlägel M., Koch E., Kirsch M., & Gumhold S., “Structural Similarity Based Anatomical and Functional Brain Imaging Fusion,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11846 LNCS, pp. 121–129, 2019,
  105. 105. Tseng H. W. and Leng H. S., “A reversible modified least significant bit (LSB) matching revisited method,” Signal Processing: Image Communication, vol. 101, p. 116556, Feb. 2022,
  106. 106. Rustad S., Andono P. N., and Shidik G. F., “Digital image steganography survey and investigation (goal, assessment, method, development, and dataset),” Signal Processing, vol. 206, p. 108908, May 2023,
  107. 107. Wang Y., Wang L., and Teo K. L., “Necessary and Sufficient Optimality Conditions for Regular–Singular Stochastic Differential Games with Asymmetric Information,” Journal of Optimisation Theory and Applications, vol. 179, no. 2, pp. 501–532, Nov. 2018,
  108. 108. Kaur M., Alzubi A. A., Walia T. S., Yadav V., Kumar N., Singh D., et al, “EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT,” IEEE Access, vol. 11, pp. 90739–90748, Aug. 2023,
  109. 109. Chuang Y. H., Lin B. S., Chen Y. X., & Shiu H. J., “Steganography in RGB Images Using Adjacent Mean,” IEEE Access, vol. 9, pp. 164256–164274, Dec. 2021,
  110. 110. Grime M. M. and Wright G., “Delphi Method,” in Wiley StatsRef: Statistics Reference Online, Wiley, vol 1. No. 16, pp. 1–6, 2016, https://doi.org/10.1002/9781118445112.stat07879
  111. 111. Yadav G. S., Mangal P., Parmar G., and Soliya S., “Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization,” Multimedia Tools and Applications, vol. 82, no. 13, pp. 20233–20249, May 2023,
  112. 112. Stalin S., Maheshwary P., and Shukla P. K., “Payback of image encryption techniques: A quantitative investigation,” 2019 International Conference on Intelligent Computing and Control Systems, ICCS 2019, pp. 1370–1380, May 2019,
  113. 113. Basuki A. I. and Rosiyadi D., “Joint Transaction-Image Steganography for High Capacity Covert Communication,” 2019 International Conference on Computer, Control, Informatics and its Applications: Emerging Trends in Big Data and Artificial Intelligence, IC3INA 2019, pp. 41–46, Oct. 2019,
  114. 114. Gupta A., Pramanik S., Bui H. T., and Ibenu N. M., “Machine Learning and Deep Learning in Steganography and Steganalysis,” Multidisciplinary Approach to Modern Digital Steganography, pp. 75–98, Jan. 2021,
  115. 115. Singh S., Siddiqui T. J., and Siddiqui T. J., “A Security Enhanced Robust Steganography Algorithm for Data Hiding,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 3, pp. 131–139, Sep. 2012.
  116. 116. Kaur R. and Singh B., “A hybrid algorithm for robust image steganography,” Multidimensional Systems and Signal Processing, vol. 32, no. 1, pp. 1–23, Jan. 2021,
  117. 117. Chen X., Kishore V., Weinberger K. Q., Chen X., Kishore V., and Weinberger K. Q., “Learning Iterative Neural Optimizers for Image Steganography,” ArXiv, p. arXiv:2303.16206, Mar. 2023,
  118. 118. Yadav S. K., Jha S. K., Sharma U. K., Shrama S., Dixit P., Prakash S., et al, “An Efficient Security Technique Using Steganography and Machine Learning,” In: Goyal D., Kumar A., Piuri V., Paprzycki M. (eds) Proceedings of the Third International Conference on Information Management and Machine Intelligence. Algorithms for Intelligent Systems. Springer, Singapore pp. 53–58, 2023, https://doi.org/10.1007/978-981-19-2065-3_7
  119. 119. Bai J., Chang C. C., Nguyen T. S., Zhu C., & Liu Y., “A high payload steganographic algorithm based on edge detection,” Displays, vol. 46, pp. 42–51, Jan. 2017,
  120. 120. Yuan H. D., “Secret sharing with multi-cover adaptive steganography,” Inf Sci (N Y), vol. 254, pp. 197–212, Jan. 2014,
  121. 121. Abdulla A. A., Sellahewa H., and Jassim S. A., “Stego quality enhancement by message size reduction and fibonacci bit-plane mapping,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8893, pp. 151–166, 2014,
  122. 122. Al-Dmour H. and Al-Ani A., “A steganography embedding method based on edge identification and XOR coding,” Expert Systems with Applications, vol. 46, pp. 293–306, Mar. 2016,
  123. 123. Abikoye O. C., Ojo U. A., Awotunde J. B., & Ogundokun R. O., “A safe and secured iris template using steganography and cryptography,” Multimedia Tools and Applications, vol. 79, no. 31–32, pp. 23483–23506, Aug. 2020,
  124. 124. Nguyen T. D., Arch-Int S., & Arch-Int N., “An adaptive multi bit-plane image steganography using block data-hiding,” Multimedia Tools and Applications, vol. 75, no. 14, pp. 8319–8345, Jul. 2016,
  125. 125. Doğan Ş., “A new data hiding method based on chaos embedded genetic algorithm for color image,” Artificial Intelligence Review, vol. 46, no. 1, pp. 129–143, Jun. 2016,
  126. 126. Bunker G., “Targeted cyber-attacks: how to mitigate the increasing risk,” Network Security, vol. 2020, no. 1, pp. 17–19, Jan. 2020,
  127. 127. Lallie H. S., Shepherd L. A., Nurse J. R., Erola A., Epiphaniou G., Maple C., et al, “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Computer Security, vol. 105, p. 102248, Jun. 2021, pmid:36540648
  128. 128. Kshetri N., “Cybercrime and Cybersecurity in Africa,” Journal of Global Information Technology Management, vol. 22, no. 2, pp. 77–81, Apr. 2019,
  129. 129. Liu J., Ke Y., Zhang Z., Lei Y., Li J., Zhang M., et al, “Recent Advances of Image Steganography with Generative Adversarial Networks,” IEEE Access, vol. 8, pp. 60575–60597, 2020,
  130. 130. Goodfellow I., Pouget-Abadie J., Mirza M., Xu B., Warde-Farley D., Ozair S., et al. (2014). Generative adversarial nets. Advances in neural information processing systems, vol. 27, pp. 1–9, 2014.
  131. 131. Subramanian N., Elharrouss O., Al-Maadeed S., and Bouridane A., “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, Mar. 2021,
  132. 132. Li Y., Ling B., Hu D., Zheng S., and Zhang G., “A Deep Learning Driven Feature Based Steganalysis Approach,” Intelligent Automation and Soft Computing, vol. 37, no. 2, Aug. 2023,
  133. 133. Kuznetsov A, Luhanko N, Frontoni E, Romeo L, Rosati R., “Image steganalysis using deep learning models,” Multimedia Tools and Applications, vol. 83, no. 16, pp. 48607–48630, May. 2024,
  134. 134. Li H, Wang J, Xiong N, Zhang Y, Vasilakos AV, Luo X., “A siamese inverted residuals network image steganalysis scheme based on deep learning,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 19 no. 6, pp. 1–23, Jul. 2023,
  135. 135. Martín A., Hernández A., Alazab M., Jung J., and Camacho D., “Evolving Generative Adversarial Networks to improve image steganography,” Expert Systems with Applications, vol. 222, p. 119841, Jul. 2023,
  136. 136. Wu D. C. and Tsai W. H. “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, no. 9–10, pp. 1613–1626, Jun. 2003,
  137. 137. Islam M. R., Siddiqa A., Uddin M. P., Mandal A. K., & Hossain M. D., “An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography,” 2014 International Conference on Informatics, Electronics and Vision, ICIEV 2014, 2014,
  138. 138. Chen H.J., “Linking employees’ e-learning system use to their overall job outcomes: An empirical study based on the IS success model,” Computers and Education, vol. 55, no. 4, pp. 1628–1639, Dec. 2010,
  139. 139. Ioannidou A., Halkidis S. T., and Stephanides G., “A novel technique for image steganography based on a high payload method and edge detection,” Expert Systems with Applications, vol. 39, no. 14, pp. 11517–11524, Oct. 2012,
  140. 140. Webb G. I., Pazzani M. J., and Billsus D., “Machine learning for user modeling,” User Model User-adapt Interact, vol. 11, no. 1–2, pp. 19–29, 2001, :1011117102175/METRICS.
  141. 141. Jordan M. I. and Mitchell T. M., “Machine learning: Trends, perspectives, and prospects,” Science (1979), vol. 349, no. 6245, pp. 255–260, Jul. 2015,
  142. 142. Majeed A. “Improving Time Complexity and Accuracy of the Machine Learning Algorithms Through Selection of Highly Weighted Top k Features from Complex Datasets,” Annals of Data Science, vol. 6, no. 4, pp. 599–621, Dec. 2019,
  143. 143. Al-Shaarani F, and Gutub A., “Securing matrix counting-based secret-sharing involving crypto steganography,” Journal of King Saud University-Computer and Information Sciences. Vol 34, no. 9, pp. 6909–6924, Oct. 2022,
  144. 144. Hureib E. S. and Gutub A. A., “Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 20, no. 12, pp. 232–241, Dec. 2022.
  145. 145. Al-Shaarani F. and Gutub A., “Securing matrix counting-based secret-sharing involving crypto steganography,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 9, pp. 6909–6924, Oct. 2022,
  146. 146. Hassan F. S. and Gutub A., “Efficient reversible data hiding multimedia technique based on smart image interpolation,” Multimedia Tools and Applications, vol. 79, no. 39, pp. 30087–30109, Oct. 2020,
  147. 147. Hassan F. S. and Gutub A., “Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 5, pp. 2017–3030, May. 2022,
  148. 148. Gutub A. and Al-Shaarani F., “Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons,” Arabian Journal for Science and Engineering, vol. 45, no. 4, pp. 2631–2644, Apr. 2020,