key: cord-0927993-vrg0mk4b authors: Jan, Aiman; Parah, Shabir A.; Hussan, Muzamil; Malik, Bilal A. title: Double layer security using crypto-stego techniques: a comprehensive review date: 2021-10-13 journal: Health Technol (Berl) DOI: 10.1007/s12553-021-00602-1 sha: 97ec9264f27f35bfd4dff41399b2082a39e3ee7e doc_id: 927993 cord_uid: vrg0mk4b Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provides double-layer protection from the potential eavesdropper. Several steganography and cryptographic approaches have been developed so far to ensure data safety during transmission over a network. The purpose of this work is to succinctly review recent progress in the area of information security utilizing combination of cryptography and steganography (crypto-stego) methods for ensuring double layer security for covert communication. The paper highlights the pros and cons of the existing image steganography techniques and crypto-stego methods. Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems. The increasing bandwidth and data rates of 4G/5G cellular technology and optical fiber communication revolutionized data communication. The exchange of data in form of text, images, audio, and video over the internet has become ubiquitous [1] . The multimedia data is being exchanged by governments, law enforcement agencies, and for telemedicine by the hospitals [2] . During the covid-19 worldwide lockdown traffic of information over the internet saw an upsurge. Although internet usage has various advantages, but security and privacy of data still remain a challenge [3] . Data thefts, modifications, and alterations have become possible due to the availability of various tools in the hands of hackers. Thus, the security of data has become a challenging task of paramount importance for researchers [4] . Various information protecting mechanisms like, cryptography and data hiding methods as shown in Fig. 1 , have been put forward to address data security issues [5] . Cryptography scrambles and converts the secret data into an unreadable form for an unauthorized person [6, 7] . Cryptography can be performed either with standard encryption techniques or Chaos based encryption techniques [8] . There are various standard encryption techniques (SET), like Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Rivest Shamir Adleman algorithm (RSA), etc. [9] . In these approaches, the secret key is used to encrypt the important data before embedding [10] . However, the bulk of data with key lengths is the main limitation of the SETs which makes them insecure and less reliable for data encryption [11] . The limitation of SETs has been overcome by the chaos based encryption approaches. Chaos encryption approach uses initial keys for encryption that are sensitive to the changes made [12] . Thus, the chaos-based encryption approaches are more secure cryptographic method to ensure security to the data [13] . Cryptography can provide the considerable security to the data by changes the form of the original data through encryption. But, cryptography alone cannot resist security attacks, as its encrypted form attract attacker's attention and hence can be modified or hacked. However, it is an insufficient method to provide data security as its encrypted form may draw the attention of an eavesdropper [14] . Hence, data hiding has been used widely by researchers to hide the existence of important data without being noticed by an intruder [15] [16] [17] . Data hiding can be divided into two methods: steganography and watermarking [18] . Watermarking is the method of verifying the authenticity of multimedia (image, video, or audio) for copyright protection [19] . It can be either visible or invisible watermarking to authenticate the ownership. Steganography is the art of hiding important data into any multimedia for secret communication [20] . It is an invisible process in which detection of data is not easy. Steganography can be separated into two categories: Technical and Linguistic steganography approaches [21] . Technical steganography can be further subdivided into two sections based on the multimedia used and the technique applied. Steganography technique has various advantages associated with it, the only difficulty of it is to maintain the image quality with a good amount of payload [22] . Huge secret data size degrades the quality of an image that can suspect the presence of data [23] . And, if the eavesdropper detects the steganographic method, it can easily recover the data. So, with the concealing approach, data should be preprocessed by including some cryptographic approaches [24] . Hence, the present trend is of crypto-stego mechanism in which along with steganography, cryptography method is included to provide double layer security to the data as shown in Fig. 2 . In this paper, the most recent literature in the area of steganography and crypto-stego has been reviewed to facilitate an exhaustive reference for further research in this area. This paper further discusses the various state-of-art techniques, their limitations, and challenges. The analysis parameters have been also discussed. The main contributions of this paper is: • A comprehensive review of various image crypto-stego methods has been presented. • Various parameters for evaluation of crypto-stego schemes have been presented. • A deep insight into double layer schemes and future research directions have been presented. The rest of the paper is organized as follows. Section 2 includes the literature survey. Evaluation parameters are discussed in Sect. 3 . Section 4 comprises the directions and future research directions. The paper concludes in Sect. 5. Steganography is the art of concealing data into any multimedia for covert communication [25] . Steganography can be divided into many types based on the cover object used to attain security, like text, image, audio, video, and network [26] [27] [28] [29] [30] [31] . Further, the steganography can be divided into two domains based on the techniques used to hide data in any multimedia, i.e., spatial domain technique and frequency domain technique [32] . Special domain can be further subdivided into various versions, like least significant bit (LSB), pixel value differencing (PVD), pixel indicator technique (PIT), Edge based technique [33] . Frequency domain can be also subdivided into different types, like discrete fourier transform (DFT), discrete cosine transform (DCT), discrete wavelet transform (DWT) [34] . In this section, the existing literature on different steganographic techniques and crypto-stego has been discussed. The paper focuses on an analysis of publications in reputed journals from 2016-2021 to be taken into consideration for future work. The various steganography data hiding technique and its coupling with cryptographic approaches have been discussed in the subsequent sections. Incorporating cryptography with the steganographic approach provides better security to the data, therefore using the steganography technique alone is 'less secure' compare to the combined approach. As once the steganographic pattern gets revealed to the unintended user, the secret data is prone to hacks and modifications. A detailed description of the spatial domain based image steganography techniques has been presented. Table 1 highlights the pros and cons of the reviewed spatial domain techniques. In 2021, AbdelRaouf [35] has proposed a novel image steganographic data hiding method. The method has used the adaptive least significant bit (LSB) method for hiding information into every color channel of an image. The method has a huge payload but takes more time for embedding data into an image. Although the technique shows considerable image quality values, however, the proposed method can be improved by introducing an encryption method before embedding to improve security. In 2021, Hussain et al. [36] have put forth an enhanced adaptive data hiding approach in which the least significant bit (LSB) and pixel value differencing (PVD) methods have been used for increasing hiding space. The method has good imperceptibility and embedding capacity. The proposed approach has focused only on payload and imperceptivity. The technique can be improved in the security domain by incorporating an encryption algorithm. In 2020, Sahu and Swain [37] have suggested Dual-layer based reversible image steganography using modified least significant bit (LSB) matching. In this approach double layer embedding has been performed to improve image quality. In the first layer, two bits of the secret data are embedded into each pixel using modified LSB matching to develop intermediate pixel pair (IPP). Whereas, in the second layer, four bits of secret information are embedded using IPP. The technique is good enough to provide a good payload with better image imperceptivity. The proposed approach can be enriched by introducing security algorithms to enhance the security of the data embedded in an image. Also, the proposed method can be extended to color images and can be improved to reduce processing time. In 2017, Hussain et al. [38] have presented a data hiding method to achieve high payload, good visual quality, and maintain security. This method is based on two novel approaches: parity-bit pixel value difference (PBPVT) and improved rightmost digit replacement (iRMDR). In this method, the cover image is separated into two non-overlapping pixel blocks. The embedding algorithm PBPVD (higher level ranges) or iRMDR (lower level ranges) are selected according to the difference value between two pixels in each block. The PBPVD technique increases embedding capacity and iRMDR attains good visual imperceptivity. However, the method can be improved by establishing a security related algorithm to improve the reliability of the method against attacks. Further, the scheme can be extended for color images also. In 2018, Malik et al. [39] have come-up with a new data hiding approach using absolute moment block truncation coding (AMBTC) compression. In this method, AMBTC compresses the cover image to embed important data into the compressed pixel values. The method is able to maintain image quality with a good payload. However, security can be improved by incorporating cryptographic approaches. In 2019, Kumar et al. [40] have proposed an enhanced method of data hiding using absolute moment block truncation coding (AMBTC) using pixel value differencing (PVD) and hamming distance. The cover image is compressed with AMBTC and is divided into three sections: smooth, lesscomplex, and highly-complex blocks. One bit per pixel is embedded into smooth blocks, 8-bits are embedded into a less-complex block using hamming distance calculation, and more data bits are embedded into a highly-complex block using the PVD technique. The method produces a good embedding space. However, can be extended in the security domain to further increase security to the data. In 2020, Chakraborty and Jalal [41] have put forth a novel image hiding method using local binary pattern (LBP). In this scheme, the cover image is separated into 3 × 3 nonoverlapping blocks. The reference pixel of each block is encoded using LBP. The encoded image is XORed with the secret image. The image has been shuffled further to embed secret image bits in the LSB of the cover image. The method has strong statistical features against attacks. The presented method can be further extended to embed data by applying payload-specific hand-crafted descriptors. In 2020, Lin et al. [42] have proposed a new image hiding method for Dynamic GIF (Graphics Interchange Format) images. The presented scheme is based on the Palette sort. In this method, the cover image is decomposed into frames (static GIF image). A new distortion function is applied to all frames. The data is then embedded into these frames to form the stego frames. In this technique, the data is secured by hiding it into an image but with less payload. In 2018, Parah et al. [43] have presented computationally efficient and reversible data hiding method [47] • Secure than existing steganography approaches • Less payload Rim et al. [48] • Good security • Good imperceptibility Hassan and Gutub [49] • Huge payload • Poor image quality • Less secure • Takes more time for embedding the data for secure electronic health record (EHR) communication. In this method, modular arithmetic has been used for embedding EHR into a medical image. Prior to embedding, the cover medical image is scaled up using the pixel reputation method. The proposed scheme has improved image quality with a better amount of payload but takes a good amount of time for embedding data into an image. The security of the method can be improved by implementing some encryption method. The technique can also be extended to color images to increase EHR embedding capacity. In 2021, Li et al. [44] have suggested a high capacity image steganography technique. The method has used retracing extended Sudoku (RE-Sudoku) reference matrix for data embedding. The paper has an enhanced payload with good image quality. The method can be improved in security domain to enhance its superiority. Also, the method can be analyzed on color images to show its generality. In 2020, Saha et al. [45] have come up with a new image hiding method using a hashedweightage Array. The method is based on extended exploiting modification direction (EMD) that creates less distortion in an image. The presented method has improved payload and reduces distortion of an image than the existing method. The security of proposed scheme can be enhanced by encrypting the secret data. In 2018, Shen et al. [46] have proposed a new data hiding method based on improved exploiting modification direction (EMD) and interpolation techniques with consideration of human visual system (HVS). In this scheme, the cover image is separated into various 3 × 3 non-overlapping blocks. The presented method hides data into each block by calculating the neighbor mean value and the difference value. The discussed method has improved embedding efficiency and quality than the traditional EMD technique. The presented method takes more time for processing the task. The scheme can be enriched by applying stegna-analysis resist method to improve security. Moreover, the technique can be improved by applying it to color images as well. In 2016, Bairagi et al. [47] have put forth an efficient image steganography method for secure communication in the Internet of Things (IoT) infrastructure. This article has presented three information hiding approaches using RGB image steganography. In this method, data has been embedded in an image using a secret key and carrier information. The technique has improved the security of the data than the traditional steganographic techniques. This work can be enhanced by applying encryption approaches for security improvement. In 2020, Rim et al. [48] have presented a Beta chaotic map based image hiding method. The method used a Beta chaotic map to sort the embedding positions of an image. The simple least significant bit (LSB) technique has been used to embed data into an image. The technique has provided good security to the data than the traditional steganographic approaches. However, the method can be improved to gain more capacity with good image quality. In 2021, Hassan and Gutub [49] have introduced an efficient image reversible data hiding (RDH) approach. In this method, interpolation optimization has been used to scale up the original image before embedding. The advantage of this method is a good image quality with a huge payload. However, the cryptographic technique can be applied to the secret data before embedding to enhance security. This subsection discusses different edge-based image steganography methods. Table 2 highlights the pros and cons of these techniques after analyzing the surveyed papers. In 2021, Atta and Ghanbari [50] have put forth a new data hiding mechanism based on dual tree complex wavelet transform (DT-CWT). In this method, the cover image has been divided into subbands and neutrosophic edge detector (NSED) has been applied on these subbands to attain edge areas. The secret data is embedded into the detected subband edge regions of an image. The method has been able to get good imperceptivity with a good amount of payload. However, needs to secure data by applying some encryption algorithms. In 2019, Dhargupta et al. [51] have proposed an image steganography approach using Fuzzy edge detection (FED). In this approach, edges of the cover image are detected by FED to embed data into edge areas of an image. Data to be embedded in an edge region depends upon the Euclidean distance and is determined by the Gaussian function. The technique shows good embedding capacity, but with an increase in payload, its quality gets degraded. The method has been applied only on grayscale images. In 2019, Ahmadian and Amirmazlaghani [52] have suggested a secret image sharing steganography scheme. This method is dependent on fully exploiting modification direction (FEMD) and edge detection technique to embed data into the cover image. The method has been able to improve image quality than the existing methods, but, has less embedding space. In 2018, Kich et al. [53] have offered an edge detection method based image steganography method. In this approach, secret information has been dissimulated into edge pixels of an image using modified simple linear iterative clustering (M-SLIC) algorithm. The technique has a good payload, robustness, and imperceptivity. However, the scheme can be also upgraded in the security domain. In 2018, He et al. [54] have suggested a reversible information hiding method using edge information. The method has been proposed for high dynamic range (HDR) color images. The data has been embedded into HDR color images by using edge information. The approach has achieved less visual distortion after embedding secret data into an image. However, the security of the data by preprocessing has not been considered to increase data security. In 2018, Gaurav and Ghanekar [55] have introduced an edge region detection based image steganography technique. The secret data has been embedded into the least significant bit (LSB) bits of edge pixels. The approach has good image quality with a better payload. However, can be improved to insert a cryptographic approach along with a steganographic method to ensure better security to the data. In 2020, Prasad and Pal [56] have introduced a new image steganography algorithm, using edge detector and modulus function. For embedding, the modulus function has been used, whereas, edge detector has been used to find edge locations to embed data into edge areas. The method has been tested only on greyscale images. Further, the technique can be improved by introducing an encryption algorithm to increase security. In 2019, Mukherjee and Sanyal [57] have presented an edge based image steganography method with a variable threshold. The edges of an image have been detected by the Sobel edge detector with respect to the threshold key. These detected regions are used to hide secret information. The scheme has gained good image quality with considerable hidden data capacity. The suggested method can be further improved by incorporating encryption schemes to the embedding data before hiding. In 2018, Kadhim et al. [58] have put forth an adaptive image steganography technique. The technique is based on edge detection over dualtree complex wavelet transform (DT-CWT). Edge regions of an image have been detected using the canny edge detection method. Even though the method has good embedding capacity and image quality, however, can be extended in the security domain to increase data security against attacks. In 2018, Ghosal et al. [59] have put forth an image steganography technique based on the Laplacian of Gaussian (LoG) edge detector. In this approach, the data has been embedded into all non-edge pair, edge pair and mixed pair of an image. By this technique, the burden of payload into the traditional method of embedding all data into edge areas only has been reduced. The method no doubt has increased payload and image quality. However, the technique can be further enhanced in the security domain. In 2021, Ghosal et al. [60] have suggested an image hiding approach based on the Kirsch edge detector. In this method, the data has been embedded into both edge and non-edge regions of an image in such a way that image distortion is minimized. The [52] • Improved image quality • Less embedding space Kich et al. [53] • Robust • Imperceptible • Less secure • Low payload He et al. [54] • [64] • Good capacity • Good visual quality • Less secure method has improved payload with less image distortion. The proposed method can be improved by applying a cryptographic method to enhance security. In 2019, Banik et al. [61] have discussed an image steganography method for embedding capacity improvement. The technique has used Kirsch detector to find the edge regions of an image for data hiding. The threshold value has been used as a key to embed data into edge areas of an image. The technique has good image quality with a good payload. The algorithm has been implemented only on greyscale images. Thus, the method can be extended to color images as well. In 2020, Wang et al. [62] have presented a high capacity hybrid steganography method based on the least significant bit (LSB) and hamming code (HLAH). In this technique, the color cover image is separated into 9 × 9 blocks and the red (R) plane is extracted. The LSB of the R plane is set to '0' and then the canny edge detection technique is used to find the edges of a plane. The method has used the canny edge detection technique to find edges. The data is embedded into the nonedge and edge regions using LSB and (3,1) hamming code. The method has been able to provide a good payload with better image quality than the existing methods. However, the security of the algorithm can be improved by encrypting the secret data prior to embedding. In 2020. Tripathy and Srivastava [63] have proposed an edge based data hiding technique using Modulus-3 strategy and comparative analysis. In this method, the data has been changed into ternary data and has been embedded into edge areas of an image using the Modulus-3 strategy. The edge regions have been detected with Sobel, Prewitt, Canny, and Laplacian edge detectors. The method has been able to hide a vast amount of data into an image with good visual image quality. However, the security of the secret data can be further improved by introducing an encryption method along with the proposed algorithm. In 2019, Tuncer and Sonmez [64] have introduced the image steganography algorithms based on edge detectors and a 2 k correction scheme. The method has used Sobel, Canny, Laplacian of Gaussian (LoG), block based edge detection (BED), and hybrid edge detectors (HED) to find edge pixels of an image. These detected regions have been used to embed data into it using the least significant method (LSB) and 2 k correction method. The technique has the good capacity with good visual quality, but, has not improved much upon security parameter. A thorough summary of the techniques reviewed under the frequency domain is given as follows and their pros and cons are pointed out in Table 3 . In 2021, Abdel-Aziz et al. [65] have offered an improved data hiding method for securing color images. In this work, the authors have used a hyper chaotic map and left-most significant bit (LMSB) embedding method to embed data into an image. In this approach, the cover image has been first encrypted using a hyper chaotic map to form the encrypted image and is then converted into the YCbCr channels. Of them, the first channel (Y) has been divided into nonoverlapping blocks using the DCT technique. The resulted blocks are quantized and secret data has been embedded into frequency coefficients of these quantized discrete cosine transform (DCT) blocks using Huffman coding. The output stego image is further XORed with the remaining two channels (CbCr) to form the encrypted stego image. The scheme has good security and image quality. However, an encrypted form of stego image can suspect the presence of data. Also, the technique can be extended for embedding any type of data into color images. In 2021, Yao et al. [66] have presented a reversible data hiding (RDH) approach for dual JPEG images. In this method, the cover image is preprocessed to attain DCT coefficients and to ascribe embedding space. Then, secret data has been embedded into obtained frequency coefficients of image pixels using the dual-JPEG RDH scheme. The technique has gained a considerable embedding space with good visual image quality. However, the secret data to be embedded has not been preprocessed to improve data security. In 2018, Liu and Chang [67] have suggested a reversible data hiding (RDH) technique for JPEG images for hiding a great amount of data. In this approach, the discrete cosine transform (DCT) technique has been used to gain the coefficient values for non-overlapping 8 × 8 blocks. The quantization method has been applied to each block of an image to attain JPEG quantized block. Then, the AC coefficients are scanned in a zigzag direction to embed secret data into non-zero elements. The proposed method has been able to gain good image quality with considerable payload, but, the enhancement of security to the data with preprocessing has not been taken into consideration. In 2018, Attaby et al. [68] have put forth a novel data hiding approach using discrete cosine transform (DCT) to embed data into JPEG images. The difference value of two DCT coefficients using modulus 3 has been applied to insert two secret data bits into the values of the coefficients of an image. This significantly reduces the image distortion with improvement in image embedding space. However, the data security of the scheme can be improved by applying a cryptography approach to secret information before embedding. In 2016, El-Rahman [69] has given a new steganographic tool to hide data into the frequency domain of an image using the discrete cosine transform (DCT) method. The technique has hidden the important information about nuclear reactor in the middle frequency. The scheme is able to protect image quality with a high considerable amount of embedding capacity. However, the confidential information of the nuclear reactor needs to be more secure from any thefts. Therefore, encryption of important information before embedding could be more effective for data security. In 2020, Mohamed et al. [70] have presented an L*a*b* (luminance channel 'L*' and chrominance channels 'a*and b*') color space image steganography technique using quadtrees. The method has applied the quad-tree of the grayscaled cover to the RGB of the cover image. The resultant blocks of the quad-tree are transformed to L*a*b* color space using 2dimentional-discrete cosine transform (2D-DCT) to embed data into the largest zero areas of DCT. The method has considerable embedding capacity, good image quality, and secure than the existing spatial and frequency domain steganography methods. However, the technique is complex. In 2018, Rabie et al. [71] have suggested increased embedding space and image quality data hiding scheme based on transform domain mechanism. The presented scheme uses the quad tree segmentation method to divide the blocks of the cover image. In each block, quantization step and piecewise linear curve fitting are used to hide secret data in the least significant areas of discrete cosine transform (DCT) coefficient areas. The method has tried to gain a better image payload. However, the data is embedded directly without pre-processing that may lead to security issues. In 2017, Saidi et al. [72] have put forth a new steganographic approach Based on discrete cosine transform (DCT) and chaotic map. The presented approach is used to find coefficients of the cover image. Piecewise linear chaotic map (PWLCM) has been used to scramble embedding positions to improve security to the embedding data. The algorithm has a good payload, however, the technique has poor image imperceptivity. Also, the technique can be improved further to resist any statistical attacks. In 2018, Nipanikar et al. [73] have discussed a sparse representation based image steganography technique using particle swarm optimization (PSO) and discrete wavelet transform (DWT) approaches. These approaches have been used to locate the appropriate pixels for embedding speech signal in the cover image. The method is able to achieve good image imperceptibility and payload. However, the algorithm can be extended in the security domain to enhance data security. In 2018, Nevriyanto et al. [74] have presented an image steganography method using discrete wavelet transform (DWT) and singular value decomposition (SVD) techniques. In this scheme, a text file has been converted into an image to form a watermark for embedding it into an image. The secret watermark has been embedded into the frequency coefficients of an image using the SVD method. The method can be further made secure enough against attacks by incorporating encryption methods on the data and can be also extended to color images. In 2018, Miri and Faez [75] have introduced an image steganography technique for hiding important data into frequency coefficients of an image. This method has used the integer wavelet transform (IWT) method to obtain the frequency coefficients of an image. The method has been analyzed on greyscale images that can be extended to color images. The security of the data can be further improved by introducing encryption methods to the secret data before embedding. In 2019, Kalita et al. [76] have proposed a new steganography method using integer wavelet transform (IWT) and the least significant bit (LSB) substitution method. To estimate the embedding capacity, the coefficient value differencing method has been applied. The scheme has good visual quality of an image and considerable embedding capacity. However, the data can be secured from statistical attacks by introducing encryption algorithms. In 2021, Ghosal et al. [77] have presented exploiting Laguerre transform (LT) based image hiding method. In this scheme, the cover is separated into m-pixel non-overlapping groups. Each pixel of these groups is then transformed into its equivalent coefficients using LT. The secret data is embedded into these coefficients. The resulted pixels are adjected to minimize distortion and have been recomputed by applying inverse LT (ILT). The presented scheme has been able to increase payload with good image quality but takes more time for completing the process. However, the method can be secured by encrypting the data. In 2019, Ma et al. [78] have come up with a new reversible data hiding (RDH) approach for medical images. The method is based on block classification and code division multiplexing (CDM). In this scheme, the non-overlapping blocks of the medical image are categorized into smooth and texture groups by calculating mean square error (MSE). The secret information has been embedded into transformed frequency coefficients using the integer-to-integer discrete wavelet transform (IDWT) technique of the texture block. The method has large data hiding capacity with good image imperceptibly. Security to the secret data can be further improved by applying cryptography approaches to the secret data prior to embedding. In 2020, Murugan and Subramaniyam [79] have proposed an image steganography technique to ensure the data security transaction over an insecure network. The data has been embedded into coefficient values of an image using the alpha factor. The image pixels have been transformed with the 2dimentional-Haar discrete wavelet transform (2D-Haar DWT) to gain four sub-bands. The method has good embedding space while preserving image quality than the existing schemes. Also, the proposed method is secure than already existing frequency domain techniques. However, the proposed method is complex. This subsection includes the reviewed papers of different dual security image steganography techniques. These techniques have encrypted the secret data/ secret image with either standard encryption method or chaotic method before embedding to provide double layer security to the secret data. The pros and cons of different dual security image steganography methods are shown in Table 4 . The following subsections discuss the different combined image steganography and encryption techniques. The review of different special domain based image steganography and encryption methods are explained below: In 2021, Maji et al. [80] have presented a spatial domain based image steganography method in which higher order pixel bits have been used to embed data. To encrypt data, XOR operation has been used to enhance security. Since the method has been implemented on the greyscale image. Thus, the presented approach can be extended to color images to prove its generality. In 2017, Sharif et al. [81] have presented an image steganography technique based on a 3-dimensional chaotic map. In this method, the pixel position for embedding changes with the change in the cover image. Thus, makes the system secure against any statistical attacks. However, the method can be improved in terms of complexity. In 2020, Gambhir and Mandal [82] have proposed chaos based least significant bit (CLSB) steganography method. The technique has used logistic map chaotic function to develop random numbers. The scheme shows good security and image quality results. However, can be improved further to increase embedding space to hide huge data into an image. In 2019, Prasad and Pal [83] have proposed logistic map based image steganography. This method has used the least significant bit (LSB) and pixel value differencing (PVD) techniques to embed data into the cover image. The embedding data is encrypted using a logistic map to improve security to the data. The proposed algorithm has attained better security. The technique can be modified in a different way to achieve better visual image quality and can be extended to color images also. In 2017, Mohammad et al. [84] have offered image steganography for visual contents authenticity. The method uses color model transformation, three-level encryption algorithm (TLEA), Morton scanning (MS). The data has been embedded with the direct least significant bit (LSB) substitution method using MS. TLEA has been used to encrypt data. The scheme provides the best algorithm for visual content authenticity in social networks. While the technique is complex and has less payload. In 2019, Alotaibi et al. [85] have proposed a secure framework for safe data transmission in mobile devices using hash, cryptography, and steganography. The proposed method has used a hash function for storing the secret password, cryptography with AES method for encrypting password, and LSB method for hiding encrypted password into an image. The method is able to provide a considerable amount of payload but has low visual quality of an image. In 2021, Mathivanan and Balaji [86] have suggested a QR code based color image stego-crypto technique. The method uses dynamic bit replacement and logistic map for embedding and encryption respectively. In this approach, the secret data is converted into 2D binary using base64 encoding method and QR code generator and is then embedded into an image using dynamic bit replacement technique. The image is then scrambled using a logistic map. The method is secure against differential attacks but is able to hide a low amount of secret data. In 2021, Abdelwahab et al. [87] have put forth an efficient image steganography technique to hide data for safe data transmission. In this scheme, plain text is encrypted using the RSA method and is embedded into the YCbCr components of an image using the LSB approach. The resulted stego image is then compressed using Huffman coding, Run Length coding (RLC), or DWT to form compressed stego image. The method has good amount of payload with considerable image quality. However, the scheme is complex. Few edge detections based image steganography techniques along with data encrypting approaches are discussed as under: In 2021, Parah et al. [88] have presented efficient security, high payload, and reversible electronic health record (EHR) data hiding approach. In this method, the cover image is scaled up with the pixel reputation method (PRM) and then the boundary conditions are applied to the image. The resulted image is divided into 2 × 2 blocks to embed data first into counter diagonal pixels and then to the main diagonal pixel after checksum computation. The EHR is secured by adding a watermark and applying the RC4 encryption method. The encrypted data is divided into 3-bit chunks and has been then embedded into the pixels after applying the left data mapping (LDM) method. The scheme has increased security to the data and has authenticated its originality. However, with a high payload, the quality of an image can be enhanced by testing the method to color images also. In 2016, Parah et al. [89] have proposed a new information hiding technique based on a hybrid edge detection method. In this scheme, the color image is separated into three planes (red, green, blue). The data is embedded into edge regions and non-edge regions of green and blue planes by making use of a hybrid edge detector. Whereas, the red plane is used to hold the bit status of green and blue planes. In order to authenticate and detect tempering the data, a fragile watermark is embedded. Before embedding, the secret information is encrypted using the RC4 algorithm. The algorithm is able to increase capacity with good image quality. Further, the security of the method is provided to the data by encrypting it prior to embedding. However, the time complexity of the method can be reduced by reducing the data extraction time. In 2020, Delmi et al. [90] have discussed the image hiding approach using the edge adaptive method and chaos cryptography technique. In this technique, the data has been encrypted using the Arnold Cat Map function. Whereas, the data has been embedded into the edge region of an image located by a canny edge detector. The technique although has increased security to the data. However, can be enhanced to increase payload with good image quality. In 2021, Sharma et al. [91] have suggested crypto-stego approach to prevent data from attacks. In this method, Rabin cryptosystem is used to encrypt the secret data, Arnold transform has been used to scramble the data, and the resulted data has been embedded into the edges of multiple images. The framework is able to provide better image quality with a considerable payload. However, the proposed approach is complex. c) Frequency domain crypto-stego techniques Different frequency domain based image steganography together with data encryption surveyed methods have been discussed in this subsection: In 2016, Kaushik and Sheokand [92] have put forth a steganography scheme based on chaotic least significant bit (LSB) and discrete wavelet (DWT) approaches. In this method, the data is encrypted using a logistic map. Whereas, the encrypted data is embedded into frequency coefficients of the cover image using DWT by 3-3-2 LSB insertion scheme. The security of the proposed method has been increased by using the chaotic method. The method has good image quality but has less embedding capacity. In 2020, Panday [93] has suggested a new medical image steganography approach using a bit mask oriented generic algorithm (BMOGA). BMOGA has been used together with cryptographic features to encrypt data. In this approach, data has been embedded in the frequency coefficients of an image. Discrete wavelet transform (DWT) (1-level & 2-level) has been used to find frequency coefficients. The technique is secure and imperceptible, however, can be enhanced to gain a good payload. However, the scheme can be further modified to reduce the complexity of the algorithm. In 2018, Elhoseny et al. [94] have presented a secure medical data transmission model for internet of things (IoT) based healthcare systems. The method has used 2-D discrete wavelet transform (2D-DWT) to conceal data into both grayscale and color images. The secret information has been encrypted using a hybrid encryption scheme using advanced encryption standard (AES) and Rivest, Shamir, and Adleman (RSA) algorithms. The technique shows good image quality with good data security. However, the technique is complex. In 2020, Duan et al. [95] have proposed a high-capacity image hiding scheme. In this method, the data have used encrypted with elliptic curve cryptography (ECC) approach. Discrete cosine transform (DCT) is applied to the secret image prior to encryption. A deep neural network has been used to increase the payload of the cover image. The method has been applied to both gray images as well as a color images. The method shows better security to the data. However, can be improved to reduce algorithm complexity. In 2018, Subhedar and Mankar [96] have presented image steganography using curvelet transform (CT) to embed secret information in the selected cover image. In order to obtain curvelet coefficients, level 6 CT has been applied to the cover image. Encryption data has been embedded into appropriate blocks by using standard deviation. Whereas, image block has been replaced with secret data block using spread spectrum when the deviation is higher than a threshold. The resulted stego image is obtained by applying inverse CT. In this technique, security has been heightened by encrypting the data using Arnold transform. However, it can be enhanced in payload and quality domain by testing it on the color image also. Further, the method is complex. In 2020, Eyssa et al. [97] have introduced an efficient image steganography method. In this approach, the data has been encrypted with the Baker map together with a discrete cosine map (DCT). The secret message in the presented method has been embedded into the values of the coefficients of an image. The security of the system has been increased. However, with a good amount of payload the image quality is less that needs to be enhanced. In 2021, Kaur and Singh [98] have introduced a new data hiding method based on discrete cosine transform (DCT) and coupled chaotic map. The secret data in this approach has been encrypted using coupled chaotic map of logistic and sine map. In this approach, the data has been embedded into the DCT coefficients of an image. The technique has a good payload, but, has been applied only on greyscale images and is complex. The review of various medical image steganography together with data encryption has been discussed in this subsection: In 2020, Hureib and Gutub [99] have proposed a combined cryptography and image steganography approach to enhance security in medical health data. In this method, Elliptic curve cryptography has been used to encrypt text before hiding. Then, the encrypted text is embedded into image pixels to hide its presence from the person who is not authorized. The technique has a good payload and image quality, however, it has not been tested for various attacks, like statistical attacks, etc. In 2020, another image steganography technique using elliptic curve cryptography has been presented [100] . The method has used 1-LSB and 2-LSB image steganography techniques to hide data into an image. The medical data has been embedded in the medical image after encrypting it with cryptography technique to improve data security. The method provides good image quality but has low embedding capacity. In 2019, Samkari and Gutub [101] have suggested a protecting mechanism for medical records against cybercrimes within the Hajj period. The method has used a 3-layer security system for medical record protection by encrypting data using hybrid cryptography method and hiding encrypted data into an image to produce stego-image for sending through the internet. The presented approach has good image quality and is safe for data transmission, however, the method is complex. In 2021, Denis and Madhubala [102] have put forth hybrid data encryption and hiding model for medical data security over cloud-based healthcare systems. In this scheme, a hybrid encryption model using AES and RSA algorithms has been used to convert the original data into an encrypted form. Whereas, the 2D-DWT and Adaptive Genetic Algorithm (AGA) based optimal adjustment method to conceal encrypted medical data into an image for safe data transmission. The proposed technique provides good image quality and is secure. However, the approach is complex and has low hiding space. In 2021, Manikandan et al. [103] have proposed an image steganography technique to secure e-health. In this approach, the secret image is first encrypted with the XOR cipher encryption and is then embedded into the cove image using LSB method. The framework has considerable image quality but provides low embedding capacity. In 2021, Ogundokum et al. [104] have presented crypto-stego medical information securing model. This technique uses international data encryption algorithm (IDEA) and Matrix-XOR techniques for enhancing security to the internet of medical things (IoMT) for the medical records protection. In this method, secret data has been encrypted using IDEA and is then embedded into carrier image using XOR. The method provides good visual quality of an image and is secure for medical data transmission. However, space for transmitting data in a concealed manner should be increased. In 2021, Prasanalakshmi et al. [105] have recommended a secure clinical data transmission technique in the internet of things (IoT) using hyperelliptic curve (HECC) and cryptography techniques. This approach has used AES and Blowfish hybrid cryptography for medical data encryption and HECC for embedding encrypted medical data into a medical image. The generated embedded image is then compressed with the 5-level DWT to attain a good payload and better security. The technique provides good image quality with considerable payload, however, the technique is complex. From the literature, it has been observed that the use of cryptography and steganography together is able to provide double layer security to the data. Cryptography protects data from hacks, and in particular chaos based cryptography can be the better option for encryption because of its ergodicity and dependence on initial condition properties. And, incorporating a steganography approach with cryptography improves data security by concealing it into digital media. Data hiding using chaotic maps to locate and create a random sequence of pixels enhances data security. Also, concealing secret information in edge regions improves payload, can prevent cover image from noticeable distortion, and thus prevents attacks. Moreover, it has been observed that cryptography and steganography have widened their applications almost in all spheres of life, like in e-health, IoT, mobile devices, system login security, cloud, etc. Evaluation parameters are the tools used to check the efficiency, validity, and superiority of an algorithm. Outcomes of the analyzed scheme with various methods whose values lie between expected ranges prove the strength of the technique. The most common characteristics of image steganography and data encryption analysis are explained below in subsections. Steganography method alters the image by storing secret information inside pixels that affects the visual quality of an image. However, changes incorporated in an image should not be perceived by the invaders. There are various standard evaluating methods used to confirm the image quality strength, like, mean square error (MSE), peak signal to noise ratio (PSNR), structural similarity index (SSIM), etc. Table 5 summarizes the MSE, PSNR, NCC, NAE, and SSIM values achieved by different image steganography techniques in this study. MSE is the error measurement of the stego image with respect to its original image. It helps in comparing the difference between the pixel values of an original image and stego image. Lesser MSE value provides better quality of an image [106] . Therefore, the MSE value should be near '0'. MSE can be calculated as follows: where p i and p i ' respectively represent the pixel values of the original and stego image. And, n represents the image size. b) Peak signal to noise ratio (PSNR): PSNR is the visual quality measuring tool that measures the image alteration in the stego image compared to its original image. It estimates the difference in pixel values of a stego image in relation to its original image. For better image quality, the PSNR value should be more than 39dB [107] . PSNR values of different existing methods for different payloads are shown in Graphs 1, 2, and 3 below. PSNR can be measured as follows: where MSE can be measured with Eq. 1. NCC is the relation determination method of an image. It investigates the relationship between the original image and its corresponding stego image. A better correlation between images indicates better image visual quality. Hence, NCC near '1' is considered as the good steganography algorithm [108] . NCC can be analyzed as follows: where O and S respectively denote the original and stego image pixel values. (2) PSNR = 10log 10 255 2 MSE NAE calculates the error between the original image and stego image to measure image quality after embedding. Error between the images should be less (near '0') to retain the image quality [88] . NAE can be expressed as follows: where O is the original image pixel value and S is the stego image pixel value. e) Structural similarity index (SSIM): SSIM is the visual quality measuring tool to checks the similarity between the original and stego image. The value of SSIM close to '1' (means 100%) represents the good image quality [109] . SSIM can be mathematically represented as follows: where µ i and µ j are the mean intensity, σ i and σ j are the standard deviations, and σ ij is the cross-covariance of images i and j respectively. Graph 1 PSNR value of existing method for 0-2 bpp embedding capacity Embedding capacity (EC) is another steganographic analysis parameter that calculates the number of secret data bits embedded into a per pixel of an image. The bits per pixel (bpp) should be more while preserving image imperceptivity. EC can be examined as follows: Here, size of an image is M × N × D, where M and N represents row and column of an image, and D represents the image pixel depth that can be either 1 or 3 depends upon the image selection (gray or color image). Therefore, maximum bpp for a grayscale image will be 8 and for color image it will be 24 (3 × 8 = 24) . Embedding capacity for different image steganography techniques is shown in Table 5 . The strength of an algorithm is tested by checking the sensitivity of an encrypted image with its original image and secret key. The strength of an encryption algorithm should be strong enough to resist attacks. The well-known differential analysis is a number of pixel change rate (NPCR) and unified average change intensity (UACI). NPCR is the security evaluating method that analysis the single pixel changes in the original image. It checks Mohamed et al. [70] Rabie et al. [71] Sharif et al. [81] Duan et al. [95] Hureib and Gutub [99] Graph 3. PSNR value of exisitng methods for 12-24 bpp embedding capacity PSNR value the sensitivity of the encrypted image compared to its original image and secret key. The acceptable NPCR value is 99.61% and closer to 100% is considered as the best encryption algorithm [110] . NPCR can be analyzed by the equation as follows: where m and n are the image measurements. E T is the total number of unequal units. And, I o and I e are the original image and encrypted image respectively. b) Unified average change intensity (UACI): UACI is the other encrypted image strength checking method. It calculates the average intensity of the difference between the original image and encrypted image. More percentage difference in intensities ensures a good UACI value and the lowest acceptable UACI value is 33.44% [110] . UACI can be calculated by the equation as follows: where I o and I e are respectively the original and encrypted images. And, m and n are the image measurements. Entropy is the average information per bit existing in an image. It checks the pixel randomness of an encrypted image. The average range of entropy is between 0 to 8 and close to 8 for 8 bit is considered as the best entropy value [111] . Entropy can be computed as follows: where S represents symbol collections, c i ϵ S, P(c i ) represents probability and n is the symbol number. The key analysis is the main tool of an encryption algorithm for checking algorithm strength. The algorithm strength depends on key analysis. It can be checked in two ways: key space and key sensitivity analysis. Key space checks the size of the secret key used for encrypting an image. The larger size of the secret key makes the system secure against attacks, as it will be difficult for the unauthorized user to get the exact same key. Key sensitivity checks the sensitivity of the secret key to the changes made. Even a single bit change in the original key results in an altogether different image or unrecoverable image. Statistical analysis checks the robustness of an encrypted image against attacks. The commonly used statistical analyses are histogram analysis and correlation coefficient for testing its robustness against attacks. Histogram analysis represents the image by the number of data points within a definite range. The histogram gives the pixel distribution or uncommon forms of an image. Histogram analysis can be checked on stego image or encrypted image in comparison to the original image. In the steganography approach, the histogram deviations of the stego image with respect to its original image can suspect the presence of data in an image. Therefore, for histogram comparison of stego image, the stego image histogram should resemble the original image histogram to avoid statistical attacks. Whereas, the histogram of an encrypted image should be uniform to show its random behavior. Histogram uniformity among pixels claims the robustness of the encryption method. Thus, the histogram of an encrypted image should be uniform to prevent the data from statistical attacks. b) Correlation coefficient (CC): The correlation coefficient (CC) checks the relationship between the original image and the encrypted image. In the original image, the pixels are interconnected with each other in three different directions: horizontal, vertical, and diagonal. However, for encrypted images, the correlation range between the pixels is [1, 1] and near 0 (lesser correlated) is considered as the good encryption technique [112] . The correlation coefficient can be expressed as follows: Here, i and j represent image coordinates and C(i, j) represents the covariance between them. σ(i) and σ(j) are the standard deviations of their respective image coordinates. m is the pixel pairs (i n, j n ) number. And, x(i) and x(j) are the mean deviations of i n and j n respectively. Randomness analysis checks the pixel haphazardness of an encrypted image. National Institute of Standards and Technology (NIST) [113] Scheme efficacy is analyzed by the execution time of an algorithm to complete its task [114] . The execution time of a method depends upon the system configuration and the algorithm complexity. This analysis can be examined for different processing steps of a program, like, embedding process, encryption process, the extraction process, decryption process, etc. The execution time for any of the program steps should be as small as possible to make the method computationally efficient. The embedding and extraction of some image steganography techniques are shown in Table 6 . Medical image accuracy analysis checks the accuracy and precision of resulted medical image after treating with the steganography method. The commonly used methods are accuracy, specificity, sensitivity, and precision, [115] for analyzing the performance and quality contents of an image after steganography. a) Accuracy: Accuracy is the medical image quality content and prediction accuracy measuring tool. It is the ratio between all correct predictions (positive or negative) and the entire test set [115, 116] . Accuracy can be measured by the Equation as follows: where TP is true positive, TN is true negative, FP is false positive, and FN is false negative. b) Specificity: Specificity is also called as true negative rate (TNR). It is the ratio between the number of correctly predicted normal people and the total number of normal people [115] . Specificity can be calculated by the Equation as follows: where TN is true negative and FP is false positive. c) Sensitivity: Sensitivity is also called true positive rate (TPR) and recall. It is the ratio between the correctly predicted people with a disease and the total number of actual diseased people [115] . Sensitivity can be computed as follows: where TP is true positive and FN is false negative. d) Precision: Precision is also called a positive prediction value (PPV). It is the ratio between the total number of positive predictions people with a disease and the total number of positive predicted people [115] . Precision can be expressed as follows: where TP is true positive and FP is false positive. Sahu and Swain [37] 9.0000 11.0000 Parah et al. [43] 8.2633 -Shen et al. [46] 6.7300 -Hassan and Gutub [49] 3.7870 -Ghosal et al. [77] 1.5400 1.4100 Parah et al. [88] 0.9804 0.0547 Parah et al. [89] 0.3481 2.3270 For secure information transmission, the image steganographic technique is used to restrict intrusion. It embeds the secret data bits into the image pixels to hide the data from unauthorized extraction. Numerous image steganography techniques have been developed by researchers to ensure data security. New trends in image steganography are discussed in this comprehensive review. From the literature, it can be observed that most of the techniques have been able to provide security and safety to the data. The security of data has been enhanced by some of the crypto-stego techniques discussed to provide double layer security to the data. From the survey of the existing image steganography and crypto-stego techniques, it can be noticed that each algorithm has its advantages and disadvantages. A few of the important issues as future directions are highlighted below: • Using smooth regions for hiding data creates more distortion in an image and thus suspects the presence of data. Hiding data into the edge regions not only provides good image quality but increases the embedding capacity of an image. Therefore, edge based image steganography technique could be used to increase the hiding space and visual quality of an image. • Most of the image steganography methods discussed have taken grayscale images as a cover medium. Therefore, there is a need for developing and applying steganography methods also on color images to prove its versatility and to further increase payload. • Hiding data into the frequency coefficients of an image provides security to the data but provides less capacity and is a complex method. Therefore, robust algorithms should be developed in spatial domain to improve data security with less complexity for which the encryption of data together with steganography can be helpful. • Many of the existing image steganography approaches have tried to either improve payload, image quality, or security of the algorithm. Therefore, a good tradeoff between these parameters should be created to improve the overall performance of the method in all dimensions. For this, edge based image steganography and chaos based encryption methods could be used together. Although, the research in this field has been done by the researchers. Though, it is still an underdeveloped field that needs to be explored in various image steganography schemes and different chaotic maps. • A survey of the literature leads us to conclude that computational complexity is still an open area of research in the area of the image steganography method. • Experimental analysis of different reviewed techniques has not used all the evaluation parameters for analyzing the scheme. It can be observed from the survey that image steganography algorithms that encrypt data before embedding have not tested the technique for basic NPCR, UACI, and other security tools. To ensure strong security to the encrypted data. Therefore, every encryption method should be tested for different security tools. • The steganography approach should resist geometrical attacks, signal processing attacks, and noise attacks to ensure its reliability, so development of robust steganographic systems is an open area of research. • Several methods have been tested only on few image formats. Therefore, an effort should be done to create a benchmark dataset to compile the algorithm for different image formats. Technological advancement is increasing exponentially to ease daily activities and for a fast service delivery system. For todays' efficient communication system, the internet acts as a central pillar and reduces overconsumption of resources like time and cost. However, the internet is an open environment for data thefts, data modifications, etc. Therefore, to protect data/information from getting into the wrong hands, the image steganography method is used for ensuring data security. The purpose of this review paper is to present a comprehensive review of various image steganography and crypto-stego techniques with their pros and cons to help the reader understand different image crypto-stego techniques. This paper also gives insight into the evaluation parameters being used for steganography and cryptography analysis. This review is significantly highlights the grey areas in the area of the image steganography. Most of the existing image steganography approaches still suffer in terms of less security, low payload, poor image quality, and complexity. Therefore, it is a necessity to develop efficient image steganographic schemes along with data encryption to improve image embedding capacity, image imperceptibility, security with less complexity and should be resistant to different attacks. Funding This work is not supported by any funding. Informed consent NA The authors do not have any conflict of interest. Secure data transmission in IoTs based on CLoG edge detection. Future Generation Computer system Compression multi-level crypto stego security of texts utilizing colored email forwarding Data and Privacy: getting consumers to trust products enabled by the Internet of Things Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst 3-Layer PC text security via combining compression, aes cryptography 2LSB image steganography Hiding in Encrypted Images: A three tier security data hiding technique. Multidim Syst Sign Process Remodeling randomness prioritization to boost-up security of rgb image encryption A novel laplacian of gaussian and chaotic encryption based image steganography technique A novel chaotic image encryption algorithm based on improved baker map and logistic map Logistic map-based image steganography using edge detection A novel multi-dimensional multiple image encryption technique Dynamic analysis of digital chaotic maps via state-mapping networks 2D Logistic-Sine-Coupling map for image encryption image steganography using uncorrelated color space and its application for security of visual contents in online social networks High-capacity data hiding for ABTC-EQ based compressed image Improving data hiding within colour images using hue component of HSV colour space Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme Temper detection and self-recovery of medical imagery for smart health Secure and robust digital image watermarking using coefficient differencing and Chaotic encryption Image feature based high capacity steganographic algorithm Image steganography in special domain: A survey Payload location for JPEG image steganography based on co-frequency subimage filtering An improved image steganography technique using edge based data hiding in DCT domain Performance analysis of hybrid edge detector scheme and magic cube based scheme for steganography application SmartSteganography: Light-weight generative audio steganography model for smart embedding applications An RGB colour image steganography scheme using overlapping block-based pixel-value differencing Securing data via cryptography and Arabic text steganography Integrating light-weight cryptography with diacritics Arabic text steganography improved for practical security applications Image based steganography to facilitate improving counting-based secret sharing, 3D Research Multi-bits stego-system for hiding text in multimedia images based on user security priority Combining RSA and audio steganography on personal computers for enhancing security A Robust Quasi quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors Realisation and robustness evaluation of a blind spatial domain watermarking technique Contrasting the performance of discrete transformations on digital image steganography using artificial intelligence A new hiding approach for image steganography based on visual color sensitivity Enhanced adaptive data hiding method using LSB and pixel value differencing Reversible image steganography using duallayer LSB matching A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim Syst Sign Process Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing A novel local binary pattern based feature image steganography A new steganography method for dynamic GIF images based on palette sort Electronic Health Record Hiding in Images for Smart City Applications: A Computationally Efficient and Reversible Information Hiding Technique for Secure Communication. Future Generation Comp Sys Retracing extended sudoku matrix for high-capacity image steganography Extended exploiting modification direction based steganography using hashed-weightage array A novel adaptive data hiding based on improved EMD and interpolation An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. Information Security J: A Global Perspective Taylor & Francis Beta chaotic map based image steganography. Springer Nature Efficient image reversible data hiding technique based on interpolation optimization 2021 A high payload data hiding scheme based on dual tree complex wavelet transform Fuzzy edge detection based steganography using modified Gaussian distribution A novel secret image sharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms. Signal Process Image Commun Image Steganography Based on Edge Detection Algorithm Reversible data hiding for high dynamic range images using edge information Image steganography algorithm based on edge region detection and hybrid coding Stego-key-based image steganography scheme using edge detector and modulus function Edge based image steganography with variable threshold Adaptive Image Steganography Based on Edge Detection Over Dual-Tree Complex Wavelet Transform Springer Nature International Publishing High payload image steganography based on Laplacian of Gaussian (LoG) edge detector Image steganography based on Kirsch edge detection Image steganography using edge detection by Kirsch operator and flexible replacement technique High-capacity adaptive steganography based on LSB and hamming code An Edge-Based Image Steganography Method Using Modulus-3. Strategy and Comparative Analysis Springer Nature A Novel Data Hiding Method based on Edge Detection and 2k Correction with High Payload and High Visual Quality Improved data hiding method for security color images Dual-JPEG-image reversible data hiding Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients Data hiding inside JPEG images with high resistance to Steganalysis using a novel technique: DCT-M3 A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information L*a*b color space high capacity steganography utilizing quad-trees Maximizing embedding capacity and stego quality: curve-fitting in the transform domain A new adaptive image steganography scheme based on DCT and chaotic map A sparse representation based image steganography using particle swarm optimization and wavelet transform Image steganography using combine of discrete wavelet transform and singular value decomposition for more robustness and higher peak signal noise ratio An image steganography method based on integer wavelet transform A new steganography method using integer wavelet transform and least significant bit substitution Exploiting Laguerre transform in image steganography A code division multiplexing an block classification-based real-time reversible data-hiding algorithm for medical images. J Real-Time Image Proc Performance analysis of image steganography using wavelet transform for safe and secured transaction Cover independent image steganography in spatial domain using higher order pixel bits A novel method for digital image steganography based on a new three-dimensional chaotic map Multicore implementation and performance analysis of a chaos based LSB steganography technique Logistic map-based image steganography scheme using combined LSB and PVD for security Enhancement. Springer Nature Adv Intel Comput Image steganography for authenticity of visual contents in social networks Secure mobile computing authentication utilizing hash, cryptography and steganography combination QR code base color image stegocrypto technique using dynamic bit replacement and logistic map Efficient combination of RSA cryptography, lossy and lossless compression steganography techniques to hide data Efficient security and authentication for edge-based Internet of Medical Things Information Hiding in Edges: A high capacity information hiding technique using hybrid edge detection Digital image steganography by using edge adaptive based chaos cryptography Multi-image steganography and authentication using crypto-stego techniques A steganography technique based on chaotic LSB and DWT Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography Secure Medical Data Transmission Model for IoT-Based Healthcare Systems A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network Curvelet transform and cover selection for secure steganography An efficient image steganography approach over wireless communication system A hybrid algorithm for image steganography Enhancing medical data security via combining elliptic curve cryptography and image steganography Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography Protecting medical records against cybercrimes within hajj period by 3-layer security Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare system Secure E-Health using image steganography Cryptostego based model for securing medical information on IOMT platform Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography A new image steganography method with optimum pixel similarity for data hiding in medical images A secure multimedia steganography scheme using hybrid transform and support vector machine for cloud-based storage Efficient implementation of multiimage secret hiding based on LSB and DWT steganography comparisons Image steganography using uncorrelated color space and its application for security of visual contents in online social networks A novel cryptographic substitution box design using gaussian distribution A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps Anovel discrete image encryption algorithm based o n finite algebraic structures. Multimed Tools Appl An Integrated Dual Entropy Core True Random Number Generator Window of Multistability and Control in a Simple 3D Hopfield Neural Network: Application to Biomedical Image Encryption Evaluation of the effect of steganography on medical image classification accuracy A new evaluation method for medical image information hiding techniques 80 Malik et al [39] Kumar et al. [40] Lin et al. [42] Shen et al. [46] Bairagi et al. [47] Hassan and Gutub [49] Ahmadian and…Kich et al. [53] Gaurav and Ghanekar… Ghosal et al. [60] Yao et al. [66] Saidi et al. [72] Miri and Faez [75] Kalita et al. [76] Ghosal et al. [77] Ma et al. [78] Murugan and…Maji et al. [81] Alotaibi et al. [85] Abdel wahab et al. [87] Parah et al. [88] Delmi et al. [89] Kaushik and Sheokand… Elhoseny et al. [95] Subhedar and Mankar… Eyssa et al. [97] Kaur and Singh [98] Hureib and Gutub [100] Manikandan et al. [103]