<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Politeknik Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-9429</issn>
                                                                                            <publisher>
                    <publisher-name>Gazi Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.2339/politeknik.1567237</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Engineering (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Mühendisliği (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>Bir Siber Casus Olarak Dijital Görüntü: Gizli Bilgileri Aktarmak İçin Gri Kodlu Güvenli Bir Model</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Digital Image as a Cyber Spy: A Gray Coded Secure Model to Transfer the Secret Information</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-5325-5416</contrib-id>
                                                                <name>
                                    <surname>Macit</surname>
                                    <given-names>Hüseyin Bilal</given-names>
                                </name>
                                                                    <aff>MEHMET AKİF ERSOY ÜNİVERSİTESİ, BUCAK ZELİHA TOLUNAY UYGULAMALI TEKNOLOJİ VE İŞLETMECİLİK YÜKSEKOKULU</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260315">
                    <day>03</day>
                    <month>15</month>
                    <year>2026</year>
                </pub-date>
                                        <volume>29</volume>
                                        <issue>2</issue>
                                        <fpage>1</fpage>
                                        <lpage>13</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241014">
                        <day>10</day>
                        <month>14</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250629">
                        <day>06</day>
                        <month>29</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1998, Politeknik Dergisi</copyright-statement>
                    <copyright-year>1998</copyright-year>
                    <copyright-holder>Politeknik Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>İnternetin yaygınlaşması ve veri transferinin farklı türde cihazlar arasında da gerçekleştirilebilir olması, günümüzde yoğun bir multimedya trafiğinin oluşmasına neden olmuştur. Yalnızca Meta grubuna bağlı sosyal medya platformlarında saniyede yüz binden fazla statik görüntü dosyası transferi gerçekleşmektedir. Özellikle görüntü, ses, video gibi doğrudan insan algısını hedef alan multimedya nesneleri ağ üzerinde birer siber casus olarak kullanılabilmektedir. Bunun için genellikle steganografi yöntemleri kullanılır. Bu çalışma, alternatif bir dijital görüntü steganografisi yöntemi önermektedir. Önerilen yöntem, alışılmışın dışında hem frekans alanında hem de bit düzlemi dilimleme yöntemi ile çalışmaktadır. Gizli veriye, minimum entropi elde etmek için gray kodlaması uygulanmıştır. Yöntemin sonuçları, farklı gray kodu uzunlukları ve farklı bit düzlemi dilimleri üzerinde çok sayıda iterasyon gerçekleştirerek yüzey grafikleri ve tablolar ile sunulmuştur. Yöntemin gerçek dünyada uygulanabilirliği için steganaliz testleri yapılmış ve sonuçları gösterilmiştir. Yöntem algılanamazlık, sağlamlık ve veri yükü açısından literatürdeki bazı yöntemlerle kıyaslanmıştır. Yüksek veri yüküne rağmen, yapısal ve algısal matematiksel testlerde benzer yöntemlerden daha yüksek skorlar elde edilmiştir.</p></trans-abstract>
                                                                                                                                    <abstract><p>The widespread use of the Internet and the ability of data transfer between different types of devices have caused intense multimedia traffic today. More than a hundred thousand image files are transferred per second on Meta group social media platforms alone. In particular, multimedia objects that directly target human perception such as images, audio, and video can be used as cyber spies on the network. Steganography methods are generally used for this. This study proposes an alternative digital image steganography method. The proposed method works in both the frequency domain and bit plane slicing methods, which is unusual. Gray coding is applied to the secret data to obtain minimum entropy. The results of the method are presented with surface graphics and tables by performing many iterations on different gray code lengths and different bit planes. Steganalysis tests have been performed for the applicability of the method in the real world and the results are shown. The method has been compared with some methods in the literature in terms of imperceptibility, robustness, and data load. Despite the high data load, higher scores were obtained than similar methods in structural and perceptual mathematical tests.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Cyber spy</kwd>
                                                    <kwd>  Image steganography</kwd>
                                                    <kwd>  Bit plane slicing</kwd>
                                                    <kwd>  Steganalysis</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Siber casus</kwd>
                                                    <kwd>  Görüntü steganografisi</kwd>
                                                    <kwd>  Bit düzlemi dilimleme</kwd>
                                                    <kwd>  Steganaliz</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Apau R., Koranteng F.N., Gyamfi S.A, “Cyber-crime and its effects on E-commerce technologies”, Journal of Information, (5)1: 39–59, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Park H.S., “Technology convergence, open innovation, and dynamic economy”, Journal of Open Innovation: Technology, Market, and Complexity, (3)4: 24, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Norquay, J. 2023, “How Many Emails Are Sent Per Day In 2024?”, [Online] https://prosperitymedia.com.au/how-many-emails-are-sent-per-day-in-2024, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Aslam S., “80+ Facebook Statistics You Need to Know in 2023—Omnicore.” [Online] https://www.omnicoreagency.com/facebook-statistics/, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Aslam, S. “Instagram by the Numbers: Stats, Demographics &amp; Fun Facts”, [Online] https://www.omnicoreagency.com/instagram-statistics/, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	Duarte, F., “Amount of Data Created Daily”, J [Online] https://explodingtopics.com/blog/data-generated-per-day, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Waseso B.M.P., Setiyanto N.A., “Web phishing classification using combined machine learning methods”, Journal of Computing Theories and Applications, (1)1: 11–18, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Sakr, H.A., El-Afifi, M.I. “A Framework for Confidential Document Leakage Detection and Prevention”, Nile Journal of Communication &amp; Computer Science, (7), (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Apau R., Asante M., Twum F., Ben Hayfron-Acquah J., Peasah K.O., “Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review”, PLoS ONE, 19(9), (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Gautam, D., Agrawal, C., Sharma, P., Mehta M., Saini, P., &quot;An Enhanced Cipher Technique Using Vigenère and Modified Caesar Cipher,&quot; 2nd International Conference on Trends in Electronics and Informatics, Tirunelveli, India, 1-9, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Qadir A.M., Varol N., “A review paper on cryptography,” 7th International Symposium on Digital Forensics and Security, 1–6, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Sahu A.K., Sahu M., “Digital image steganography and steganalysis: A journey of the past three decades,” Open Computer Science, (10)1: 296–342, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	Stallings W. Brown L., “Computer security: principles and practice”. Upper Saddle River: Pearson Education, IV. Edition, ISBN: 978-0133773927, England, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Al-Batah, M.S., Alzboon, M.S., Alzyoud, M., Al-Shanableh, N. “Enhancing Image Cryptography Performance with Block Left Rotation Operations”, Applied Computational Intelligence and Soft Computing, (2024)1: 1-19, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	Westfeld, A., “Steganalysis in the Presence of Weak Cryptography and Encoding”, 5th International Workshop, Jeju Island, Korea, 19-35, (2006).</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	Kour J., Verma, D., “Steganography Techniques – A Review Paper”, International Journal of Emerging Research in Management &amp;Technology, 3(5): 132-135, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Macit, H.B., Koyun, A., Güngör, O., “A Review and Comparison of Steganography Techniques”, 4’th International Academic Research Congress, Alanya, Türkiye, 37-44, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	Kurnaz H., &quot;Hibrit Yaklaşımlı Yeni Bir Seganografi Yönteminin Geliştirilmesi,&quot; M.S. thesis, Kocaeli University, Institute of Science, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	Chaum D., “Untraceable Electronic Mail, Return DWTresses and Digital Pseudonyms”, Communications of the ACM, 24(2), 84-88, (1981).</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Jayaram, P., Ranganatha, H.R., Anupama, H.S. “Information Hiding Using Audio Steganography – A Survey”, The International Journal of Multimedia &amp; Its Applications, (3)3: 86-96, (2011).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	Macit, H.B., “The Effect of Resolution and Watermark Strength on Multi-level DWT Image Watermarking”, Düzce Üniversitesi Bilim ve Teknoloji Dergisi, (12)2: 1178-1191, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	Kutucu, H., Dişli, A., Akça, M., “Çok Katmanlı Steganografi Tekniği Kullanılarak Mobil Cihazlara Haberleşme Uygulaması”, Akademik Bilişim Konferansı, Eskişehir, Türkiye, 672-678, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	Liu, B., Xu, E., Wang, J., Wei, Z., Xu, L., Zhao, B., Su, J., “Thwarting Audio Steganography Attacks in Cloud Storage Systems”, International Conference on Cloud and Service Computing, Hong Kong, 259-265, (2011).</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Rabah, K. “Steganography – The Art of Hiding Data”, Information Technology Journal, 3(3): 245-269, (2004).</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	Cachin, C., “An information-theoretic model for steganography”, Information Hiding 2nd International Workshop, New York, 306–318, (1998).</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26]	Rachid, R.S., “Binary Image Watermarking on Audio Signal Using Wavelet Transform”, M.S. thesis, Çankaya University, Institute of Science, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	Şener, D., Güney, S. “Enhancing Steganography in 256×256 Colored Images with U-Net: A Study on PSNR and SSIM Metrics with Variable-Sized Hidden Images”, Review of Computer Engineering Studies, (11)2: 13-29, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	Poornima R., Iswarya R.J., “An overview of digital image steganography”, International Journal of Computer Science &amp; Engineering Survey, (4)1: 23–31, (2013).</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29]	Özdemir B., Doğan N., “Data hiding to the image with bit plane slicing and double XOR”, MANAS Journal of Engineering, (10)1: 66-72, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	Jebur, S.A., Nawar, A.K., Kadhim, L.E., Jahefer, M.M. “Hiding Information in Digital Images Using LSB Steganography Technique”, International Journal of Interactive Mobile Technologies, 17(7): 167-178, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	Akbar S., Rao K.N., Anand T., “Bit-Plane Slicing Algorithm for Crime Data Security Using Fusion Technologies”, International Journal of Recent Technology and Engineering, (7): 323-325, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32]	Abdülkhaev, A., “A New Approach for Video Watermarking”, M.S. thesis, Gaziantep University, Institute of Science, (2016).</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33]	Patel, M., Sajja, P.S., Sheth, R., “Analysis and Survey of Digital Watermarking Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, (3)10: 203-210, (2013).</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">[34]	Araghi, T.K., Megías, D. “Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking”, Multimed Tools App, (83): 3895–3916, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">[35]	Pereira, S., Voloshyoskiy, Y., Pun, T., “Optimal transform domain watermark embedding via linear programming”, Signal Process, (81)6: 1251-1260, (2001).</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">[36]	Hsieh, M., Tseng, D., Huang, Y., “Hiding Digital Watermarks Using Multiresolution Wavelet Transform”, IEEE Trans. on Industrial Electronics, 48(5): 875-882, (2001).</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">[37]	Xia, X.G., Boncelet, C.G., Arce, G.R., “A multiresolution watermark for digital images”, IEEE International Conference on Image Processing, Santa Barbara, USA, 548-551, (1997).</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">[38]	Yavuz, E., “Duruk İmgelerde Damgalama ve Veri Saklama”, PhD. thesis, Ankara University, Institute of Science, (2008).</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">[39]	Abd-El-Atty, B., El-Aﬀendi, M., El-Latif, A.A.A., “A novel image cryptosystem using Gray code, quantum walks, and Henon map for cloud applications”, Complex &amp; Intelligent Systems, (9): 609–624, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">[40]	Ngyuen, B.C., Yoon, S.M., Lww, H.K., “Multi Bit Plane Image Steganography”, 5th International Workshop, Jeju Island, Korea, 8-10, (2006).</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">[41]	Qi, W. Liu, Y., Sirui, G., Wang, X., Guo, Z. “An Adaptive Visible Watermark Embedding Method based on Region Selection”, Security and Communication Networks, (2021), 1-11, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">[42]	Mannepalli, P.K., Richhariya, V., Gupta, S.K. “A robust blockchain-based watermarking using edge detection and wavelet transform”, Multimed Tools Appl, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">[43]	Dinçer G., Entropi Kavramının İstatistikteki Bazı Uygulamaları, M.S. thesis, Yıldız Teknik University, Institute of Science, (2015).</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">[44]	Shannon, C.E., “A mathematical theory of communication”, Bell Systems Technology Journal, (27): 379-423, (1948).</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">[45]	Pal, N.R., Pal, S.K., “Entropy: A New Definition And Its Applications”, IEEE Transactions on Systems, Man and Cybernetics, (21)5: 1260-1270, (1991).</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">[46]	Farrell, J. E., “Image quality evaluation in colour imaging: vision and technology”, Eds: MacDonald, L.W., Luo, M.R., John Wiley, Stanford, (1999).</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">[47]	Cadik, M., Slavik, P., “Evaluation of two principal approaches to objective image quality assessment”, 8th International Conference on Information Visualisation, North Carolina, 513-551, (2004).</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">[48]	Hore, A., Ziou, D., “Image quality metrics: PSNR vs. SSIM”, International Conference on Pattern Recognition, İstanbul, Türkiye, 2366-2369, (2010).</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">[49]	Wang, Z., Bovik, A. C., Sheikh, H. R., Simoncelli, E. P., “Image quality assessment: from error visibility to structural similarity”, IEEE Transactions on Image Processing, (13)4: 600-612, (2004).</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">[50]	Setiadi, D.R.I.M., Rustad, S., Andono, P.N., Shidik G.F., “Graded fuzzy edge detection for imperceptibility optimization of image steganography”, The Imaging Science Journal, (72)6: 693-705, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">[51]	Saeidi, Z., Yazdi, A., Mashhadi, S., Hadian, M. Gutub, A., “High performance image steganography integrating IWT and Hamming code within secret sharing”, IET Image Process, (2024)18: 129–139, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">[52]	Pramanik, S., “An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm”, Multimed Tools App, (82): 34287–34319, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">[53]	Prasad, S. Pal, A.K., Mukherjee, S., “An RGB Color Image Steganography Scheme by Binary Lower Triangular Matrix”, IEEE Transactions on Intelligent Transportation Systems, (24)7: 6865-6873, (2023).</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">[54]	Dumre, R., Dave, A., “Exploring LSB Steganography Possibilities in RGB Images”, 12th International Conference on Computing Communication and Networking Technologies, Kharagpur, India, 1-7, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">[55]	Abdel-aziz, M.M., Hosny, K.M., Lashin, N.A., “Improved data hiding method for securing color images”, Multimed Tools Appl, (80): 12641–12670, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">[56]	Kareem, H.R., Madhi, H.H., Mutlaq, KA., “Hiding encrypted text in image steganography”, Periodicals of Engineering and Natural Sciences (8)2, pp. 703–707, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">[57]	Pak, C. Kim, J. An. K., Kim, C., Kim, K., “A novel color image LSB steganography using improved 1D chaotic map”, Multimed Tools Appl, (79): 1409–1425, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref58">
                        <label>58</label>
                        <mixed-citation publication-type="journal">[58]	Rahman, S., Masood F., Khan, W.U., Ullah, N., Khan, F.Q., Tsaramirsis, G., Jan, S., Ashraf, “A Novel Approach of Image Steganography for Secure Communication Based on LSwB Substitution Technique”, Computers, Materials &amp; Continua, (64)1: 31–61, (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref59">
                        <label>59</label>
                        <mixed-citation publication-type="journal">[59]	Calanda, F.B., Sison, A.M., Molato, M.R.D., Medina, R.P., “A Modified Least Significant Bit Randomized Embedding Method based on Image Partitioning and Columnar Transposition with Encryption”, 2nd International Conference on Computing and Big Data, New York, 68–72, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref60">
                        <label>60</label>
                        <mixed-citation publication-type="journal">[60]	 Solak, S., Altınışık, U., “A New Approach for Steganography: Bit Shifting Operation of Encrypted Data in LSB (SED-LSB)”, J Inf Tech, (12)1: 75–82, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref61">
                        <label>61</label>
                        <mixed-citation publication-type="journal">[61]	Setyono, A., Ignatius, D.R., Setiadi, M., “Securing and Hiding Secret Message in Image using XOR Transposition Encryption and LSB Method”, Journal of Physics, (1196): 1-6, (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref62">
                        <label>62</label>
                        <mixed-citation publication-type="journal">[62]	Mukherjee, S., Sanyal, G., “A chaos based image steganographic system”, Multimed Tools Appl, (77)21: 27851–27876, (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref63">
                        <label>63</label>
                        <mixed-citation publication-type="journal">[63]	Rajput G.G., Chavan R., “A Novel Approach for Image Steganography Based On Random LSB Insertion in Color Images”, International Conference on Intelligent Computing Systems, Tamilnadu, India, 265–273, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref64">
                        <label>64</label>
                        <mixed-citation publication-type="journal">[64]	Chauhan, S., Jyotsna, Kumar, J., Doegar, A., “Multiple layer Text security using Variable block size Cryptography and Image Steganography”, 3rd International Conference on Computational Intelligence &amp; Communication Technology, Ghaziabad, India, 1-7, (2017).</mixed-citation>
                    </ref>
                                    <ref id="ref65">
                        <label>65</label>
                        <mixed-citation publication-type="journal">[65]	Dagar, S., “Highly Randomized Image Steganography using Secret Keys”, IEEE International Conference on Recent Advances and Innovations in Engineering, Jaipur, India, 1-5, (2014).</mixed-citation>
                    </ref>
                                    <ref id="ref66">
                        <label>66</label>
                        <mixed-citation publication-type="journal">[66]	Jaradat, A., Taqieddin, E., Mowafi, M., &quot;A high-capacity image steganography method using chaotic particle swarm optimization&quot;, Hindawi Security and Communication Networks, (2021)1, 1-11, (2021).</mixed-citation>
                    </ref>
                                    <ref id="ref67">
                        <label>67</label>
                        <mixed-citation publication-type="journal">[67]	Babu, A.R., Al-Fatlawy, R.R., Veeranjaneyulu, K., Kumar, K.S., &quot;Canonical Huffman Coding (CHC) - Discrete Wavelet Transform (DWT) Method for Image Steganography,&quot; 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, India, 1-4, (2024).</mixed-citation>
                    </ref>
                                    <ref id="ref68">
                        <label>68</label>
                        <mixed-citation publication-type="journal">[68]	Yassin, N.I.R., El-Houby, E.M.F., &quot;Image Steganography Technique Based on Integer Wavelet Transform Using Most Significant Bit Categories.&quot; International Journal of Intelligent Engineering &amp; Systems, (15)1, 499-508, (2022).</mixed-citation>
                    </ref>
                                    <ref id="ref69">
                        <label>69</label>
                        <mixed-citation publication-type="journal">[69]	Fridrich, J., Goljan, M., Du, R., “Reliable Detection of LSB Steganography in Color and Grayscale Images”, ACM Workshop on Multimedia and Security, Ottawa, Canada, 27-30, (2001).</mixed-citation>
                    </ref>
                                    <ref id="ref70">
                        <label>70</label>
                        <mixed-citation publication-type="journal">[70]	Hassan, M.D., Amin, M.A.M., Mahdi, S.T., &quot;Steganalysis Techniques and Comparison of Available Softwares&quot;, Proceedings of the 1st International Multi-Disciplinary Conference Theme: Sustainable Development and Smart Planning, IMDC-SDSP-2020, (2020).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
