  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Fusion: Practice and Applications</full_title>
  <abbrev_title>FPA</abbrev_title>
  <issn media_type="print">2692-4048</issn>
  <issn media_type="electronic">2770-0070</issn>
  <doi_data>
   <doi>10.54216/FPA</doi>
   <resource>https://www.americaspg.com/journals/show/3545</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2018</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2018</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Survey of Research Opportunities that use Artificial Intelligence in Image Steganography</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Artificial Intelligence Department, Libyan International University, Benghazi, Libya</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Sultan</given_name>
    <surname>Sultan</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">School of Computing, University of Portsmouth, Portsmouth PO1 3HE, UK</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Bander Ali Saleh Al</given_name>
    <surname>Al-rimy</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Computer Department, Applied College, Najran University, Najran 66462 , Kingdom of Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Sultan Ahmed</given_name>
    <surname>Almalki</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Computer Science Department, Faculty of Computing and Information, Al-Baha University, Al-Baha, 65779, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Tami Abdulrahman</given_name>
    <surname>Alghamdi</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Engineering, College of Computer Science and Information Technology, Majmaah University, Majmaah, 11952, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Azan Hamad</given_name>
    <surname>Alkhorem</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science, University of Idaho, Moscow, ID 83844, USA</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Frederick T.</given_name>
    <surname>Sheldon</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Steganography conceals ”secrets” within an convenient and expedient multimedia carrier. The carrier could be text (i.e., not plain text), images, audio andor video files (i.e., carrier channels). The fact that concealed information is contained in the otherwise ordinary and mundane carrier file is known only by the sender-receiver pair. Only they share the existence of the secret. Images are the most popular (i.e., multimedia) carriers because of their inherent property that enables better obfuscation. Content adaptive image steganography is a new trend in the field for messaging secrets inside unsuspected image file transfers. As the name suggests, the embedding locations are altered adaptively depending on the image content that optimizes the decision of choosing a location inside the carrier so that an embedding is not discernible (i.e., additive distortion is minimized). Herein, we critique the various approaches used for content-adaptive image steganography which can be broadly categorized as CNNbased, GAN-based, along with minimizing additive distortion function-based. We provide a brief historical account toward better anticipating the future research opportunities in terms of properties, and evaluation metrics. A summary table of these past and future directions is provided. Moreover, we highlight trends along with their concomitant advantages and disadvantages toward identifying opportunity gaps.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>21</first_page>
   <last_page>232</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/FPA.180216</doi>
   <resource>https://www.americaspg.com/articleinfo/3/show/3545</resource>
  </doi_data>
 </journal_article>
</journal>
