{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:42:37Z","timestamp":1777704157356,"version":"3.51.4"},"reference-count":25,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T00:00:00Z","timestamp":1577750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,3,4]]},"abstract":"<jats:p>Image steganography provides efficient techniques and methods for embedding secure data into an image. Researchers face many challenges in this field such as: ensuring the quality of the stego image is adequate, ensuring the hidden message is secure, increasing the hiding capacity, recovering the hidden message and the cover image losslessy, and overcoming the effects of lossy image compression on the hidden message. In this paper, we address the above challenges by proposing a new image steganography model to ensure the security of data in cloud storage. The fundamental processes within the base level of the proposed model are to preprocess both the cover image and the secret message. The cover image is transformed to the wavelet domain using integer-to-integer transform while the secret message is compressed using lossless entropy coding and then it is encrypted for additional security before embedding. The control level of the model drives the steganography process as follows. Firstly, it selects significant coefficients from the transformed cover image according to some threshold values. Then, it creates groups of 7-bits and 3-bits from non-lossy bits of selected significant coefficients and the encrypted bit stream of the secret message, respectively. Finally, the non-lossy bits in the selected significant coefficients are updated by injecting the secret bits. Through the process of steganography, the consistency between the payload of the secret message and the number of selected significant coefficients is checked. The model is validated and verified using extensive real experiments. Moreover, the performance of the proposed model is measured by comparison with other recent models.<\/jats:p>","DOI":"10.3233\/jifs-179563","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:38:48Z","timestamp":1577777928000},"page":"2777-2788","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel and dependable image steganography model for strengthening the security of cloud storage"],"prefix":"10.1177","volume":"38","author":[{"given":"Mostafa","family":"Ahmad","sequence":"first","affiliation":[{"name":"Department of Computer Science, Faculty of Computers and Information, Menoufia University, Shebin El-Kom, Egypt"},{"name":"Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia"}]},{"given":"Ahmed","family":"Ghoneim","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"},{"name":"Department of Computer Science, College of Science, Menoufia University, Egypt"}]},{"given":"Saleh","family":"Alshomrani","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Artificial Intellgence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"}]},{"given":"Ahmed","family":"Samak","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia"},{"name":"Department of Computer Science, College of Science, Menoufia University, Egypt"}]},{"given":"Nader","family":"Omar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia"}]},{"given":"Fahad","family":"Algarni","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing and Information, University of Bisha, Saudi Arabia"}]}],"member":"179","published-online":{"date-parts":[[2019,12,31]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.5120\/13161-0818"},{"key":"e_1_3_1_3_2","unstructured":"AhmadMostafa A. MeligyAly M. and HashimAmal H. High capacity image steganography using threshold embedding with lossless EZW bit stream. In Sixth International Conference on Intelligent Computing and Information Systems (ICICIS) (2013) pp. 149\u2013154 14\u201316."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"issue":"1","key":"e_1_3_1_5_2","first-page":"79","article-title":"Secure bit-plane based steganography for secret communication","volume":"93","author":"Cong-Nguyen B.","year":"2010","unstructured":"Cong-NguyenB., Hae-YeounL., Jeong-ChunJ. and Heung-KyuL., Secure bit-plane based steganography for secret communication, IEICE Transactions on Information and Systems 93(1) (2010), 79\u201386.","journal-title":"IEICE Transactions on Information and Systems"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1147\/rd.383.0243"},{"key":"e_1_3_1_7_2","unstructured":"CurrieDaniel L. CreekN.L. and IrvineCynthia E. Surmounting the effects of lossy compression on steganography. In Proceedings of the 19th National Information System Security Conference (1996) pp. 194\u2013201."},{"key":"e_1_3_1_8_2","first-page":"113","article-title":"A survey of image steganography techniques","volume":"54","author":"Hussain M.","year":"2013","unstructured":"HussainM. and HussainM., A survey of image steganography techniques, International Journal of Advanced Science and Technology 54 (2013), 113\u2013124.","journal-title":"International Journal of Advanced Science and Technology"},{"key":"e_1_3_1_9_2","doi-asserted-by":"crossref","unstructured":"HwangR-J. ShihT.K. KaoC-H. and ChangT-M. Lossy compression tolerant steganography. In The Human Society and the Internet Internet-Related Socio-Economic Issues (2001) pp. 427\u2013435. Springer.","DOI":"10.1007\/3-540-47749-7_34"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.06.008"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.05.032"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.10.08"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.11.001"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/78.258085"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","unstructured":"SunZ. and JiZ. A security steganography method for lossy compression gray scale image. In Advanced Intelligent Computing Theories and Applications With Aspects of Theoretical and Methodological Issues (2007) pp. 636\u2013645. Springer.","DOI":"10.1007\/978-3-540-74171-8_63"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.01.149"},{"issue":"4","key":"e_1_3_1_17_2","first-page":"4","article-title":"An analysis of lsb & dct based steganography","volume":"10","author":"Walia Dr E.","year":"2010","unstructured":"WaliaDr E., JainP. and NavdeepN., An analysis of lsb & dct based steganography, Global Journal of Computer Science and Technology 10(4) (2010), 4\u20138.","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.03.083"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/214762.214771"},{"key":"e_1_3_1_20_2","first-page":"1520","author":"Xua G.","year":"2005","unstructured":"XuaG., ShiY.Q., YangC., ZhengY., ZouD. and ChaiP., Lossless data hiding using integer wavelet transform and threshold embedding technique. In IEEE International Conference on Multimedia and Expo, ICME 2005, (2005), pp. 1520\u20131523. IEEE.","journal-title":"Lossless data hiding using integer wavelet transform and threshold embedding technique"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.012"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.11.006"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.07.008"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.12.007"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179563","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179563","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:40:34Z","timestamp":1777455634000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179563"}},"subtitle":[],"editor":[{"given":"Ahmed","family":"Farouk","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,12,31]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3,4]]}},"alternative-id":["10.3233\/JIFS-179563"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179563","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,31]]}}}