A Review of Image Steganography Based on Metaheuristic Optimization Algorithms
Main Article Content
Abstract
Due to the widespread popularity of digital images on the Internet, image-based steganography has become a widely adopted technique for embedding secret information into everyday visual content. In parallel, steganalysis plays a vital role in digital forensics and information security by seeking to uncover hidden content within these images. Although steganographic techniques—particularly those employing adaptive embedding strategies—have made significant progress, many steganalysis approaches still struggle to generalize effectively across different image types and embedding methods. This contrast highlights the need for more intelligent, flexible, and robust analysis frameworks. This review examines steganographic techniques for digital images and the application of metaheuristic algorithms in steganalysis. These algorithms are employed in tasks such as feature selection and parameter optimization. They can also function as classifiers themselves, thereby enhancing the detection of hidden information. We conducted a structured review of over 100 research articles, categorizing steganographic approaches based on their embedding domain (spatial and frequency) and steganalysis techniques according to the metaheuristic algorithms they utilize. Metaheuristic algorithms have demonstrated significant promise in improving the effectiveness of steganalysis by optimizing both feature selection and classification processes. However, their performance is often influenced by factors such as parameter tuning, initialization strategies, and the quality of extracted features. Recent studies also show a growing trend toward hybrid and ensemble-based techniques, which further enhance detection accuracy and reliability.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] G. Eason, B. Noble, and I. N. Sneddon, "On certain integrals of Lipschitz-Hankel type involving products of Bessel functions," Phil. Trans. Roy. Soc. A, vol. 247, pp. 529–551, Apr. 1955.
[2] M. Wu and B. Liu, Multimedia Data Hiding. Berlin, Germany: Springer, 2003.
[3] A. Melman and O. Evsutin, "Image data hiding schemes based on metaheuristic optimization: A review," Artif. Intell. Rev., vol. 56, no. 12, pp. 15375–15447, 2023.
[4] H. Alyasiri, J. A. Clark, and D. Kudenko, "Evolutionary computation algorithms for detecting known and unknown attacks," in Proc. Int. Conf. Secur. Inf. Technol. Commun., Cham, Switzerland: Springer, 2018, pp. 170–184.
[5] A. Zeinalpour and C. P. McElroy, "Comparing metaheuristic search techniques in addressing the effectiveness of clustering-based DDoS attack detection methods," Electronics, vol. 13, no. 5, p. 899, 2024.
[6] E.-S. M. El-Kenawy et al., "Advanced dipper-throated meta-heuristic optimization algorithm for digital image watermarking," Appl. Sci., vol. 12, no. 20, p. 10642, 2022.
[7] M. F. Şahin and F. Anka, "Metaheuristics role in image processing and computer vision applications: A comprehensive review," Cluster Comput., vol. 28, no. 13, p. 871, 2025.
[8] F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding—A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999.
[9] S. Sharma, A. Gupta, M. C. Trivedi, and V. K. Yadav, "Analysis of different text steganography techniques: A survey," in Proc. Int. Conf. Comput. Intell. Commun. Technol. (CICT), 2016, pp. 130–133.
[10] N. Li, J. Qin, X. Xiang, and Y. Tan, "Robust coverless video steganography based on pose estimation and object tracking," J. Inf. Secur. Appl., vol. 87, p. 103912, 2024.
[11] J. Kunhoth, N. Subramanian, S. Al-Maadeed, and A. Bouridane, "Video steganography: Recent advances and challenges," Multimedia Tools Appl., vol. 82, no. 27, pp. 41943–41985, 2023.
[12] X. Liao and C. Shu, "Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels," J. Vis. Commun. Image Represent., vol. 28, pp. 21–27, 2015.
[13] A. K. Sahu and M. Sahu, "Digital image steganography and steganalysis: A journey of the past three decades," Open Comput. Sci., vol. 10, no. 1, pp. 296–342, 2020.
[14] F. Şahin, T. Çevik, and M. Takaoğlu, "Review of the literature on the steganography concept," Int. J. Comput. Appl., vol. 975, p. 8887, 2021.
[15] M. A. Majeed, R. Sulaiman, Z. Shukur, and M. K. Hasan, "A review on text steganography techniques," Mathematics, vol. 9, no. 21, p. 2829, 2021.
[16] B. Chauhan, S. Borikar, S. Aote, and V. Katankar, "A survey on image cryptography using lightweight encryption algorithm," Int. J. Sci. Res. Sci. Eng. Technol., vol. 4, no. 4, pp. 344–347, 2018.
[17] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. San Francisco, CA, USA: Morgan Kaufmann, 2007.
[18] N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, "Image steganography techniques: An overview," Int. J. Comput. Sci. Secur., vol. 6, no. 3, pp. 168–187, 2012.
[19] J. M. Jenifer, S. R. Ratna, J. S. Loret, and D. M. Gethsy, "A survey on different video steganography techniques," in Proc. Int. Conf. Trends Electron. Inform. (ICOEI), 2018, pp. 627–632.
[20] D. Pandey et al., "Secret data transmission using advanced steganography and image compression," Int. J. Nonlinear Anal. Appl., vol. 12, no. Special Issue, pp. 1243–1257, 2021.
[21] N. Jain, S. Meshram, and S. Dubey, "Image steganography using LSB and edge–detection technique," Int. J. Soft Comput. Eng., vol. 2, no. 3, pp. 217–222, 2012.
[22] R. Krenn, "Steganography and steganalysis," 2004.
[23] J. Kour and D. Verma, "Steganography techniques–A review paper," Int. J. Emerg. Res. Manag. Technol., vol. 3, no. 5, pp. 132–135, 2014.
[24] G. Kaur and A. Kochhar, "A review on image steganography techniques," Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 5, no. 4, pp. 227–231, 2015.
[25] F. Q. A. Alyousuf, R. Din, and A. J. Qasim, "Analysis review on spatial and transform domain technique in digital steganography," Bull. Electr. Eng. Inform., vol. 9, no. 2, pp. 573–581, 2020.
[26] T. Morkel, J. H. Eloff, and M. S. Olivier, "An overview of image steganography," in Proc. Inf. Secur. South. Afr. Conf. (ISSA), 2005, pp. 1–11.
[27] R. Rădescu and R. Gliga, "An introduction to steganography," UPB Sci. Bull. Ser. C Electr. Eng., vol. 64, no. 1–4, pp. 17–24, 2004.
[28] J. M. Koelling, Digital Imaging: A Practical Approach. Walnut Creek, CA, USA: Altamira Press, 2004.
[29] M. Douglas, K. Bailey, M. Leeney, and K. Curran, "An overview of steganography techniques applied to the protection of biometric data," Multimedia Tools Appl., vol. 77, no. 13, pp. 17333–17373, 2018.
[30] N. Sharma and U. Batra, "A review on spatial domain technique based on image steganography," in Proc. Int. Conf. Comput. Commun. Technol. Smart Nation (IC3TSN), 2017, pp. 24–27.
[31] A. O. Aljahdali and O. A. Al-Harbi, "Double layer steganography technique using DNA sequences and images," PeerJ Comput. Sci., vol. 9, p. e1379, 2023.
[32] S. Sajasi and A.-M. E. Moghadam, "An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method," Appl. Soft Comput., vol. 30, pp. 375–389, 2015.
[33] C.-K. Chan and L.-M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004.
[34] D.-C. Wu and W.-H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognit. Lett., vol. 24, no. 9–10, pp. 1613–1626, 2003.
[35] H.-C. Wu, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," IEE Proc. Vis. Image Signal Process., vol. 152, no. 5, pp. 611–615, 2005.
[36] C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun, "Adaptive data hiding in edge areas of images with spatial LSB domain systems," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488–497, Sep. 2008.
[37] C.-H. Yang, "Varied PVD+LSB evading detection programs to spatial domain in data embedding systems," J. Syst. Softw., vol. 83, no. 10, pp. 1635–1643, 2010.
[38] X. Liao, Q.-Y. Wen, and J. Zhang, "A steganographic method for digital images with four-pixel differencing and modified LSB substitution," J. Vis. Commun. Image Represent., vol. 22, no. 1, pp. 1–8, 2011.
[39] Y.-P. Lee et al., "High-payload image hiding with quality recovery using tri-way pixel-value differencing," Inf. Sci., vol. 191, pp. 214–225, 2012.
[40] M. Khodaei and K. Faez, "New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing," IET Image Process., vol. 6, no. 6, pp. 677–686, 2012.
[41] J. Chen, "A PVD-based data hiding method with histogram preserving using pixel pair matching," Signal Process. Image Commun., vol. 29, no. 3, pp. 375–384, 2014.
[42] G. Swain, "Adaptive pixel value differencing steganography using both vertical and horizontal edges," Multimedia Tools Appl., vol. 75, no. 21, pp. 13541–13556, 2016.
[43] D. A. Shehab and M. J. Alhaddad, "Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research," Symmetry, vol. 14, no. 1, p. 117, 2022.
[44] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal Process., vol. 90, no. 3, pp. 727–752, 2010.
[45] J. Mielikainen, "LSB matching revisited," IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.
[46] J. Al-Azzeh, Z. Alqadi, B. Ayyoub, and A. Sharadqh, "Improving the security of LSB image steganography," JOIV Int. J. Inform. Vis., vol. 3, no. 4, pp. 384–387, 2019.
[47] R. Chandramouli and N. Memon, "Analysis of LSB based image steganography techniques," in Proc. Int. Conf. Image Process. (ICIP), vol. 3, 2001, pp. 1019–1022.
[48] I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, "Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299–326, 2019.
[49] D.-C. Wu and Z.-N. Shih, "Image steganography by pixel-value differencing using general quantization ranges," CMES-Comput. Model. Eng. Sci., vol. 141, no. 1, 2024.
[50] N.-I. Wu and M.-S. Hwang, "Data hiding: Current status and key issues," Int. J. Netw. Secur., vol. 4, no. 1, pp. 1–9, 2007.
[51] M. Alanzy, R. Alomrani, B. Alqarni, and S. Almutairi, "Image steganography using LSB and hybrid encryption algorithms," Appl. Sci., vol. 13, no. 21, p. 11771, 2023.
[52] S. Saha et al., "Extended exploiting modification direction based steganography using hashed-weightage array," Multimedia Tools Appl., vol. 79, no. 29, pp. 20973–20993, 2020.
[53] T. D. Nguyen, S. Arch-Int, and N. Arch-Int, "An adaptive multi bit-plane image steganography using block data-hiding," Multimedia Tools Appl., vol. 75, no. 14, pp. 8319–8345, 2016.
[54] K. Muhammad et al., "A secure method for color image steganography using gray-level modification and multi-level encryption," KSII Trans. Internet Inf. Syst., vol. 9, no. 5, pp. 1938–1962, 2015.
[55] M. Hassaballah, Digital Media Steganography: Principles, Algorithms, and Advances. Cambridge, MA, USA: Academic Press, 2020.
[56] V. M. Potdar and E. Chang, "Grey level modification steganography for secret communication," in Proc. IEEE Int. Conf. Ind. Inform. (INDIN), 2004, pp. 223–228.
[57] M. Safarpour and M. Charmi, "Capacity enlargement of the PVD steganography method using the GLM technique," arXiv:1601.00299, 2016.
[58] Y.-K. Lee and L.-H. Chen, "High capacity image steganographic model," IEE Proc. Vis. Image Signal Process., vol. 147, no. 3, pp. 288–294, 2000.
[59] P. C. Mandal, I. Mukherjee, G. Paul, and B. Chatterji, "Digital image steganography: A literature survey," Inf. Sci., vol. 609, pp. 1451–1488, 2022.
[60] M. Dalal and M. Juneja, "Steganography and steganalysis (in digital forensics): A cybersecurity guide," Multimedia Tools Appl., vol. 80, no. 4, pp. 5723–5771, 2021.
[61] T. Alobaidi and W. Mikhael, "An adaptive steganography insertion technique based on wavelet transform," J. Eng. Appl. Sci., vol. 70, no. 1, p. 144, 2023.
[62] J. Khandelwal, V. K. Sharma, D. Singh, and A. Zaguia, "DWT-SVD based image steganography using threshold value encryption method," Comput. Mater. Continua, vol. 72, no. 2, 2022.
[63] M. Hamidi, M. E. Haziti, H. Cherifi, and M. E. Hassouni, "Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform," Multimedia Tools Appl., vol. 77, no. 20, pp. 27181–27214, 2018.
[64] A. Raid, W. Khedr, M. A. El-Dosuky, and W. Ahmed, "JPEG image compression using discrete cosine transform—A survey," Int. J. Comput. Sci. Eng. Surv., vol. 5, no. 2, 2014.
[65] T. Rabie, M. Baziyad, and I. Kamel, "High-fidelity steganography: A covert parity bit model-based approach," Algorithms, vol. 17, no. 8, 2024.
[66] T. Alobaidi and W. Mikhael, "An adaptive steganography insertion technique based on cosine transform," Iraqi J. Electr. Electron. Eng., vol. 20, no. 2, 2024.
[67] M. K. Abdmouleh, A. Khalfallah, and M. S. Bouhlel, "A novel selective encryption scheme for medical images transmission based-on JPEG compression algorithm," Procedia Comput. Sci., vol. 112, pp. 369–376, 2017.
[68] M. C. Stamm, S. K. Tjoa, W. S. Lin, and K. J. R. Liu, "Anti-forensics of JPEG compression," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), 2010, pp. 1694–1697.
[69] B. Bao and Y. Wang, "A robust blind color watermarking algorithm based on the Radon-DCT transform," Multimedia Tools Appl., vol. 83, no. 24, pp. 64663–64682, 2024.
[70] K. R. Malik et al., "A hybrid steganography framework using DCT and GAN for secure data communication in the big data era," Sci. Rep., vol. 15, no. 1, p. 19630, 2025.
[71] Y. Huang, Z. Liu, Q. Wu, and X. Liu, "Robust image steganography against JPEG compression based on DCT residual modulation," Signal Process., vol. 219, p. 109431, 2024.
[72] G. Savithri, Vinupriya, S. Mane, and J. Saira Banu, "Parallel implementation of RSA 2D-DCT steganography and chaotic 2D-DCT steganography," in Proc. Int. Conf. Comput. Vis. Image Process. (CVIP), vol. 1, Cham, Switzerland: Springer, 2017, pp. 593–605.
[73] P.-C. Su, Y.-H. Cheng, and T.-Y. Kuo, "JSN: Design and analysis of JPEG steganography network," Electronics, vol. 13, no. 23, p. 4821, 2024.
[74] V. K. Sharma, U. C. Pati, and K. Mahapatra, "A simple VLSI architecture for computation of 2D DCT, quantisation and zig-zag ordering for JPEG," Int. J. Signal Imag. Syst. Eng., vol. 5, no. 1, pp. 58–65, 2012.
[75] R. I. Yousif and N. H. Salman, "Image compression based on arithmetic coding algorithm," Iraqi J. Sci., pp. 329–334, 2021.
[76] J. H. Pujar and L. M. Kadlaskar, "A new lossless method of image compression and decompression using Huffman coding techniques," J. Theor. Appl. Inf. Technol., vol. 15, 2010.
[77] X. Liu, P. An, Y. Chen, and X. Huang, "An improved lossless image compression algorithm based on Huffman coding," Multimedia Tools Appl., vol. 81, no. 4, pp. 4781–4795, 2022.
[78] Y. Dong and W. D. Pan, "A survey on compression domain image and video data processing and analysis techniques," Information, vol. 14, no. 3, p. 184, 2023.
[79] J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. ACM Workshop Multimed. Secur., 2007, pp. 3–14.
[80] L. Guo, J. Ni, W. Su, C. Tang, and Y.-Q. Shi, "Using statistical image model for JPEG steganography: Uniform embedding revisited," IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2669–2680, Dec. 2015.
[81] D. Y. Mikhail, R. S. Hawezi, and S. W. Kareem, "An ensemble transfer learning model for detecting stego images," Appl. Sci., vol. 13, no. 12, p. 7021, 2023.
[82] R. Chandramouli, "A mathematical framework for active steganalysis," Multimedia Syst., vol. 9, pp. 303–311, 2003.
[83] S. A. Laskar and K. Hemachandran, "A review on image steganalysis techniques for attacking steganography," Int. J. Eng. Res. Technol., vol. 3, no. 1, 2014.
[84] K. Bailey and K. Curran, "An evaluation of image based steganography methods," Multimedia Tools Appl., vol. 30, pp. 55–88, 2006.
[85] K. D. Michaylov and D. K. Sarmah, "Steganography and steganalysis for digital image enhanced forensic analysis and recommendations," J. Cyber Secur. Technol., vol. 9, no. 1, pp. 1–27, 2025.
[86] A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems: Breaking the steganographic utilities EzStego, JSteg, Steganos, and S-Tools—and some lessons learned," in Proc. Int. Workshop Inf. Hiding, Cham, Switzerland: Springer, 1999, pp. 61–76.
[87] K. F. Rafat and S. M. Sajjad, "Advancing reversible LSB steganography: Addressing imperfections and embracing pioneering techniques for enhanced security," IEEE Access, 2024.
[88] C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), 2008, pp. 3029–3032.
[89] R. Chhikara, P. Sharma, B. Chandra, and N. Malik, "Modified bird swarm algorithm for blind image steganalysis," Int. J. Inf. Technol., vol. 15, no. 6, pp. 2877–2888, 2023.
[90] J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," in Media Watermarking, Security, and Forensics, vol. 8303, Bellingham, WA, USA: SPIE, 2012, pp. 81–93.
[91] D. D. Shankar, N. Khalil, and A. S. Azhakath, "Moderate embed cross validated and feature reduced steganalysis using principal component analysis in spatial and transform domain with support vector machine and support vector machine-particle swarm optimization," Multimedia Tools Appl., vol. 82, no. 7, pp. 10249–10276, 2023.
[92] X. Song, C. Yang, K. Han, and S. Ding, "Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain," Multimedia Tools Appl., vol. 81, no. 25, pp. 36453–36472, 2022.
[93] S. Chhikara and R. Kumar, "Image steganalysis with entropy hybridized with chaotic grasshopper optimizer," Multimedia Tools Appl., vol. 80, no. 21, pp. 31865–31885, 2021.
[94] A. K. Sahu and A. Gutub, "Improving grayscale steganography to protect personal information disclosure within hotel services," Multimedia Tools Appl., vol. 81, no. 21, pp. 30663–30683, 2022.
[95] Y. Chen, H. Wang, W. Li, and J. Luo, "Cost reassignment for improving security of adaptive steganography using an artificial immune system," IEEE Signal Process. Lett., vol. 29, pp. 1564–1568, 2022.
[96] H. Jeyaprakash, B. S. Chokkalingam, V. V, and S. Mohan, "Stego detection: Image steganalysis using a novel hidden stego visual geometry group–based CNN classification," J. Appl. Secur. Res., vol. 18, no. 4, pp. 979–999, 2023.
[97] J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868–882, Jun. 2012.
[98] A. C. Johnvictor, A. J. Amalanathan, R. M. Pariti Venkata, and N. Jethi, "Critical review of bio-inspired data optimization techniques: An image steganalysis perspective," Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 12, no. 4, p. e1460, 2022.
[99] F. Li, K. Wu, J. Lei, M. Wen, Z. Bi, and C. Gu, "Steganalysis over large-scale social networks with high-order joint features and clustering ensembles," IEEE Trans. Inf. Forensics Security, vol. 11, no. 2, pp. 344–357, Feb. 2015.
[100] Y. Wang, Y. Ma, R. Jin, P. Liu, and N. Ruan, "Comprehensive criteria-based generalized steganalysis feature selection method," IEEE Access, vol. 8, pp. 154418–154435, 2020.
[101] Y. Ma, L. Xu, Y. Zhang, T. Zhang, and X. Luo, "Steganalysis feature selection with multidimensional evaluation and dynamic threshold allocation," IEEE Trans. Circuits Syst. Video Technol., vol. 34, no. 3, pp. 1954–1969, Mar. 2023.
[102] L. Li, M. Fan, and D. Liu, "AdvSGAN: Adversarial image steganography with adversarial networks," Multimedia Tools Appl., vol. 80, no. 17, pp. 25539–25555, 2021.
[103] D. K. Sarmah, A. J. Kulkarni, and A. Abraham, Optimization Models in Steganography Using Metaheuristics. Cham, Switzerland: Springer, 2020.
[104] Z. N. Ansari and S. D. Daxini, "A state-of-the-art review on meta-heuristics application in remanufacturing," Arch. Comput. Methods Eng., vol. 29, no. 1, pp. 427–470, 2022.
[105] M. Hassaballah, M. A. Hameed, A. I. Awad, and K. Muhammad, "A novel image steganography method for industrial internet of things security," IEEE Trans. Ind. Informat., vol. 17, no. 11, pp. 7743–7751, Nov. 2021.
[106] A. A. Bahaddad, K. A. Almarhabi, and S. Abdel-Khalek, "Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption," Alex. Eng. J., vol. 75, pp. 41–54, 2023.
[107] A. S. Ali, S. Alsamaraee, and A. A. Hussein, "Optimize image steganography based on distinction disparity value and HMPSO to ensure confidentiality and integrity," J. Comput. Netw. Commun., vol. 2024, p. 2516567, 2024.
[108] P. K. Muhuri, Z. Ashraf, and S. Goel, "A novel image steganographic method based on integer wavelet transformation and particle swarm optimization," Appl. Soft Comput., vol. 92, p. 106257, 2020.
[109] S. Rezaei and A. Javadpour, "Bio-inspired algorithms for secure image steganography: Enhancing data security and quality in data transmission," Multimedia Tools Appl., vol. 83, no. 35, pp. 82247–82280, 2024.
[110] A. H. Mohsin et al., "New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity," IEEE Access, vol. 7, pp. 168994–169010, 2019.
[111] R. Denis and P. Madhubala, "Evolutionary computing assisted visually-imperceptible hybrid cryptography and steganography model for secure data communication over cloud environment," Int. J. Comput. Netw. Appl., vol. 7, no. 6, p. 208, 2020.
[112] D. D. Shankar and A. S. Azhakath, "Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization," Sci. Rep., vol. 13, p. 2359, 2023.
[113] S. Chhikara and R. Kumar, "Mi-LFGOA: Multi-island Lévy-flight based grasshopper optimization for spatial image steganalysis," Multimedia Tools Appl., vol. 79, no. 39, pp. 29723–29750, 2020.
[114] A. Adeli and A. Broumandnia, "Image steganalysis using improved particle swarm optimization based feature selection," Appl. Intell., vol. 48, pp. 1609–1622, 2018.
[115] Y. Pathak, K. Arya, and S. Tiwari, "Feature selection for image steganalysis using Lévy flight-based grey wolf optimization," Multimedia Tools Appl., vol. 78, pp. 1473–1494, 2019.
[116] Y. Ma, X. Zhang, J. Wang, R. Jin, R. Nasimov, and H. Zhang, "Digital image steganalysis network strengthening framework based on evolutionary algorithm," Sci. Rep., vol. 15, p. 7472, 2025.
[117] H. Chantar, M. Tubishat, M. Essgaer, and S. Mirjalili, "Hybrid binary dragonfly algorithm with simulated annealing for feature selection," SN Comput. Sci., vol. 2, no. 4, p. 295, 2021.
[118] M. Płachta, M. Krzemiń, K. Szczypiorski, and A. Janicki, "Detection of image steganography using deep learning and ensemble classifiers," Electronics, vol. 11, no. 10, p. 1565, 2022.