SlideShare a Scribd company logo
1 of 17
VISVESV
ARAYATECHNOLOGICALUNIVERSITY
BELAGAVI, KARNATAKA-570014
PROJECT PHASE 1:
“MULTI IMAGE STEGANOGRAPHY”
BHARATH M N
CHANNAKESHAVA B L
SAGAR B K
THARUN J M
4GK20CS005
4GK20CS010
4GK20CS027
4GK20CS038
UNDER THE GUIDANCE OF
Dr. NAVEEN T H
ASSISTANT PROFESSOR
DEPT OF COMPUTER SCIENCE &
ENGG, K K GECK
K R PETE KRISHNA GOVERNMENT ENGINEERING COLLEGE
Department of Computer Science and Engineering
HEAD OF THE DEPARTMENT
Dr.HAREESH K
ASSOCIATE PROFESSOR & HOD
DEPT OF COMPUTER SCIENCE
& ENGG, K K GECK
CONTENTS:
• Introduction
• Problem Statement
• Background work
• Approach
• Model Architecture
• Image Processing
• Aim Of The Project
• Literature survey
• Conclusion
• Reference
INTRODUCTION:
• The focus of this introduction is on the steganography of images, a widely explored domain within
the broader field of information security.
• Image steganography aims to embed secret information within image files in such a way that the
alteration is imperceptible to the human eye and difficult to detect through conventional means.
• The objective of steganography in multiple images is to distribute the payload of hidden information
across a collection of images, thus leveraging the combined capacity of the ensemble.
• This approach not only increases the overall data hiding capacity but also introduces a level of
redundancy and resilience.
EXISTING SYSTEM:
1. LSB Substitution: This method involves replacing the least significant bits of pixel values with
secret data bits. As the changes are minimal, they are often imperceptible to the human eye.
2. Spread Spectrum: It disperses the secret data across the entire image by slightly modifying the
pixel values in a way that doesn’t draw attention but allows for data retrieval.
3. Transform Domain Techniques: Using mathematical transformations like Discrete Cosine
Transform (DCT) or Discrete Fourier Transform (DFT) to embed data in the frequency domain.
This method is commonly used in JPEG steganography
4. Random LSB Embedding: Similar to LSB substitution, but instead of using a fixed pattern, it
embeds data in a randomized manner to make it harder to detect.
LITERATURE SURVEY:
NAME YEAR TECHNIQUES
Chin-Ling Chen 29 Jan 2022
Improved image quality
In steganography
Shumeet Baluja 2020
Single image
steganography using
Deep neural network
Felix Kreuk 2019
Deep neural network for
Speech steganography
Gutub and
shaarani
2020
Efficient Implementation of
image Secret Hiding Based on
LSB and DWT Steganography
Comparisons
LITERATURE SURVEY:
NAME YEAR TECHNIQUES
YC HU 2006 Multiple images
embedding scheme based
on moment preserving
block truncation codinG
ARUN KUMAR
RAVICHANDRAN K.S
2019 RIWT and QR factorization
based hybrid robust image
steganography using block
selection algorithm for IoT
devices
PROBLEM STATEMENT:
• We aim to hide multiple images (2 or more) in one not-so-secret cover
image.
• The embedded secret images must be retrievable with minimum loss.
• The encoded cover image must look like the original cover image.
Background Work:
Approach :
• Extend single image steganography to multi image steganography by combining
from both the papers.
• Extend the idea by creating multiple prep network for separate images in the
encoder and joining them with the cover image.
• Using multiple reveal networks or multiple decoders to retrieve separate secrete
messages from the container or encoded images.
• In this Project Tiny ImageNet Dataset is used.
Model Architecture
IMAGE PROCESSING
• Embedding Techniques:
Spatial Domain Techniques: Image pixels are directly manipulated to embed the secret information.
Common techniques include Least Significant Bit (LSB) substitution, where the least significant bit of each
pixel is replaced with the secret data.
Transform Domain Techniques: Embedding is performed in a transformed version of the image, often
using techniques like discrete cosine transform (DCT) or discrete wavelet transform (DWT).
• Payload Distribution Across Multiple Images:
The secret information is distributed across multiple images in a way that collectively maximizes the data-
hiding capacity. This may involve assigning different portions of the payload to different images within the
ensemble.
IMAGE PROCESSING
• Synchronization and Coherence:
Ensuring that the embedded information remains coherent and synchronized across the multiple images is crucial. Image
processing techniques are employed to manage the distribution of payload, maintaining a balance between data hiding
capacity and the visual quality of each image.
• Encryption and Security Measures:
Image processing may involve incorporating encryption techniques to enhance the security of the embedded information.
Encryption ensures that even if an unauthorized entity detects the presence of hidden data, deciphering its meaning
remains a formidable challenge
• Robustness Against Attacks:
Image processing techniques are implemented to enhance the robustness of the steganographic system against various
attacks. This includes resisting attempts to remove or alter the hidden information, as well as withstanding common image
processing operations that might be applied by attackers.
AIMS OF THE PROJECT :
• Increased Data Capacity
• Enhanced Security
• Improved Robustness
• Redundancy and Error Recovery
• Resistance to Steganalysis Tools
• Flexibility And Scalability
• Preservation of Visual Quality
• Adaptability to Diverse Environments
CONCLUSION:
• Image steganography serves as an effective method for securing sensitive information by
embedding it within the visual content of images. This covert communication allows for the
exchange of data without attracting unwanted attention.
• A fundamental aspect of image steganography is its emphasis on imperceptibility. Successful
steganographic techniques ensure that the visual integrity of the carrier image is maintained,
making it challenging for observers to detect the presence of hidden data with the naked eye.
• Image steganography finds applications across various domains, including secure
communication, data protection, digital watermarking, and copyright protection. Its versatility
makes it a valuable tool in different scenarios where the concealment of information is crucial.
REFERENCE:
• Baluja S. 2019: Hiding images within images. IEEE Transactions on Pattern Analysis
and Machine Intelligence 42(7):1685-169
• Elzeki OM, Elfattah MA, Salem H, Hassanien AE, Shams M. 2021: A novel
perceptual two layer image fusion using deep learning for imbalanced COVID-19
dataset. PeerJ Computer Science 7:e364
• Hu YC. 2006: Multiple images embedding scheme based on moment preserving
block truncation coding. Fundamenta Informaticae 73(3):373-387
• Hwang HJ, Kim S, Kim HJ. 2016: Reversible data hiding using least square predictor
via the LASSO. EURASIP Journal on Image and Video Processing 2016(1):42
REFERENCE:
• Al-Shaarani F, Gutub (2021)a: Increasing participants using counting-based secret sharing via
involving matrices and practical steganography. Arabian Journal for Science and
Engineering In Press
• Al-Shaarani F, Gutub(2021)b: Securing matrix counting-based secret-sharing involving crypto
steganography. Journal of King Saud University-Computer and Information Sciences In Press
• Arunkumar S, Subramaniyaswamy V, Ravichandran KS, Logesh R. 2019a: RIWT and QR
factorization based hybrid robust image steganography using block selection algorithm for
IoT devices. Journal of Intelligent & Fuzzy Systems 35(5):4265-4276
• Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R. 2019b. SVD-
based robust image steganographic scheme using RIWT and DCT for secure transmission of
medical images. Measurement 139:426-437
THANK
YOU

More Related Content

Similar to cse final year project of image encryption

Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
INFOGAIN PUBLICATION
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
 

Similar to cse final year project of image encryption (20)

F1803063236
F1803063236F1803063236
F1803063236
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
A coverless image steganography based on robust image wavelet hashing
A coverless image steganography based on robust image wavelet hashingA coverless image steganography based on robust image wavelet hashing
A coverless image steganography based on robust image wavelet hashing
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Visual cryptography for hybrid approach
Visual cryptography for hybrid approachVisual cryptography for hybrid approach
Visual cryptography for hybrid approach
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
 
G017444651
G017444651G017444651
G017444651
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 

Recently uploaded

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 

Recently uploaded (20)

5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
 

cse final year project of image encryption

  • 1. VISVESV ARAYATECHNOLOGICALUNIVERSITY BELAGAVI, KARNATAKA-570014 PROJECT PHASE 1: “MULTI IMAGE STEGANOGRAPHY” BHARATH M N CHANNAKESHAVA B L SAGAR B K THARUN J M 4GK20CS005 4GK20CS010 4GK20CS027 4GK20CS038 UNDER THE GUIDANCE OF Dr. NAVEEN T H ASSISTANT PROFESSOR DEPT OF COMPUTER SCIENCE & ENGG, K K GECK K R PETE KRISHNA GOVERNMENT ENGINEERING COLLEGE Department of Computer Science and Engineering HEAD OF THE DEPARTMENT Dr.HAREESH K ASSOCIATE PROFESSOR & HOD DEPT OF COMPUTER SCIENCE & ENGG, K K GECK
  • 2. CONTENTS: • Introduction • Problem Statement • Background work • Approach • Model Architecture • Image Processing • Aim Of The Project • Literature survey • Conclusion • Reference
  • 3. INTRODUCTION: • The focus of this introduction is on the steganography of images, a widely explored domain within the broader field of information security. • Image steganography aims to embed secret information within image files in such a way that the alteration is imperceptible to the human eye and difficult to detect through conventional means. • The objective of steganography in multiple images is to distribute the payload of hidden information across a collection of images, thus leveraging the combined capacity of the ensemble. • This approach not only increases the overall data hiding capacity but also introduces a level of redundancy and resilience.
  • 4. EXISTING SYSTEM: 1. LSB Substitution: This method involves replacing the least significant bits of pixel values with secret data bits. As the changes are minimal, they are often imperceptible to the human eye. 2. Spread Spectrum: It disperses the secret data across the entire image by slightly modifying the pixel values in a way that doesn’t draw attention but allows for data retrieval. 3. Transform Domain Techniques: Using mathematical transformations like Discrete Cosine Transform (DCT) or Discrete Fourier Transform (DFT) to embed data in the frequency domain. This method is commonly used in JPEG steganography 4. Random LSB Embedding: Similar to LSB substitution, but instead of using a fixed pattern, it embeds data in a randomized manner to make it harder to detect.
  • 5. LITERATURE SURVEY: NAME YEAR TECHNIQUES Chin-Ling Chen 29 Jan 2022 Improved image quality In steganography Shumeet Baluja 2020 Single image steganography using Deep neural network Felix Kreuk 2019 Deep neural network for Speech steganography Gutub and shaarani 2020 Efficient Implementation of image Secret Hiding Based on LSB and DWT Steganography Comparisons
  • 6. LITERATURE SURVEY: NAME YEAR TECHNIQUES YC HU 2006 Multiple images embedding scheme based on moment preserving block truncation codinG ARUN KUMAR RAVICHANDRAN K.S 2019 RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices
  • 7. PROBLEM STATEMENT: • We aim to hide multiple images (2 or more) in one not-so-secret cover image. • The embedded secret images must be retrievable with minimum loss. • The encoded cover image must look like the original cover image.
  • 9. Approach : • Extend single image steganography to multi image steganography by combining from both the papers. • Extend the idea by creating multiple prep network for separate images in the encoder and joining them with the cover image. • Using multiple reveal networks or multiple decoders to retrieve separate secrete messages from the container or encoded images. • In this Project Tiny ImageNet Dataset is used.
  • 11. IMAGE PROCESSING • Embedding Techniques: Spatial Domain Techniques: Image pixels are directly manipulated to embed the secret information. Common techniques include Least Significant Bit (LSB) substitution, where the least significant bit of each pixel is replaced with the secret data. Transform Domain Techniques: Embedding is performed in a transformed version of the image, often using techniques like discrete cosine transform (DCT) or discrete wavelet transform (DWT). • Payload Distribution Across Multiple Images: The secret information is distributed across multiple images in a way that collectively maximizes the data- hiding capacity. This may involve assigning different portions of the payload to different images within the ensemble.
  • 12. IMAGE PROCESSING • Synchronization and Coherence: Ensuring that the embedded information remains coherent and synchronized across the multiple images is crucial. Image processing techniques are employed to manage the distribution of payload, maintaining a balance between data hiding capacity and the visual quality of each image. • Encryption and Security Measures: Image processing may involve incorporating encryption techniques to enhance the security of the embedded information. Encryption ensures that even if an unauthorized entity detects the presence of hidden data, deciphering its meaning remains a formidable challenge • Robustness Against Attacks: Image processing techniques are implemented to enhance the robustness of the steganographic system against various attacks. This includes resisting attempts to remove or alter the hidden information, as well as withstanding common image processing operations that might be applied by attackers.
  • 13. AIMS OF THE PROJECT : • Increased Data Capacity • Enhanced Security • Improved Robustness • Redundancy and Error Recovery • Resistance to Steganalysis Tools • Flexibility And Scalability • Preservation of Visual Quality • Adaptability to Diverse Environments
  • 14. CONCLUSION: • Image steganography serves as an effective method for securing sensitive information by embedding it within the visual content of images. This covert communication allows for the exchange of data without attracting unwanted attention. • A fundamental aspect of image steganography is its emphasis on imperceptibility. Successful steganographic techniques ensure that the visual integrity of the carrier image is maintained, making it challenging for observers to detect the presence of hidden data with the naked eye. • Image steganography finds applications across various domains, including secure communication, data protection, digital watermarking, and copyright protection. Its versatility makes it a valuable tool in different scenarios where the concealment of information is crucial.
  • 15. REFERENCE: • Baluja S. 2019: Hiding images within images. IEEE Transactions on Pattern Analysis and Machine Intelligence 42(7):1685-169 • Elzeki OM, Elfattah MA, Salem H, Hassanien AE, Shams M. 2021: A novel perceptual two layer image fusion using deep learning for imbalanced COVID-19 dataset. PeerJ Computer Science 7:e364 • Hu YC. 2006: Multiple images embedding scheme based on moment preserving block truncation coding. Fundamenta Informaticae 73(3):373-387 • Hwang HJ, Kim S, Kim HJ. 2016: Reversible data hiding using least square predictor via the LASSO. EURASIP Journal on Image and Video Processing 2016(1):42
  • 16. REFERENCE: • Al-Shaarani F, Gutub (2021)a: Increasing participants using counting-based secret sharing via involving matrices and practical steganography. Arabian Journal for Science and Engineering In Press • Al-Shaarani F, Gutub(2021)b: Securing matrix counting-based secret-sharing involving crypto steganography. Journal of King Saud University-Computer and Information Sciences In Press • Arunkumar S, Subramaniyaswamy V, Ravichandran KS, Logesh R. 2019a: RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices. Journal of Intelligent & Fuzzy Systems 35(5):4265-4276 • Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R. 2019b. SVD- based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426-437