A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method

K Muhammad, J Ahmad, NU Rehman, Z Jan… - Multimedia Tools and …, 2017 - Springer
Abstract Information hiding is an active area of research where secret information is
embedded in innocent-looking carriers such as images and videos for hiding its existence …

[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …

Design and geometric control of polynomial chaotic maps with any desired positive Lyapunov exponents

C Fan, Q Ding - Chaos, Solitons & Fractals, 2023 - Elsevier
Digital chaotic maps are severely hampered by the finite calculation accuracy of the
hardware device that is used to implement them, and their applications in cryptography and …

Data flow analysis for software prefetching linked data structures in Java

B Cahoon, KS McKinley - Proceedings 2001 International …, 2001 - ieeexplore.ieee.org
Describes an effective compile-time analysis for software prefetching in Java. Previous work
in software data prefetching for pointer-based codes asses simple compiler algorithms and …

PSNR and MSE based investigation of LSB

K Joshi, R Yadav, S Allwadhi - 2016 International Conference …, 2016 - ieeexplore.ieee.org
This paper provide the detail study of LSB Steganography method and analyzes the PSNR
and MSE of LSB data hiding technique on the basis of different message sizes ie 2KB, 4KB …

A chaotic map-control-based and the plain image-related cryptosystem

Y Luo, L Cao, S Qiu, H Lin, J Harkin, J Liu - Nonlinear Dynamics, 2016 - Springer
A novel image encryption algorithm based on the total plain image and tent map is proposed
in this work. The pixels' value of a plain image and an initial key are firstly quantified to be a …

A new LSB-S image steganography method blend with Cryptography for secret communication

K Joshi, R Yadav - 2015 Third International Conference on …, 2015 - ieeexplore.ieee.org
In this paper, a new method of image steganography in spatial domain on gray images
blend with cryptography is present. Steganography and cryptography are used to hide …

A novel color image LSB steganography using improved 1D chaotic map

C Pak, J Kim, K An, C Kim, K Kim, C Pak - Multimedia Tools and …, 2020 - Springer
Abstract Conventional one-dimensional (1D) chaotic map have a simple structure, which is
easy to implement and has a low computational cost, but has a drawback that the range of …

An adaptive fuzzy inference approach for color image steganography

L Tang, D Wu, H Wang, M Chen, J Xie - Soft Computing, 2021 - Springer
This paper proposes an adaptive fuzzy inference approach for color image steganography,
taking into account the influence of image complexity such as pixel similarity, pixel …