Hybrid SVD-based image watermarking schemes: a review
Watermarking is an important technique for protecting sensitive e-multimedia data and
intellectual property. Watermarking techniques are used for many applications such as …
intellectual property. Watermarking techniques are used for many applications such as …
A novel hybrid DCT and DWT based robust watermarking algorithm for color images
AK Abdulrahman, S Ozturk - Multimedia Tools and Applications, 2019 - Springer
In this paper, a novel robust color image watermarking method based on Discrete Cosine
Transform (DCT) and Discrete Wavelet Transform (DWT) is proposed. In this method, RGB …
Transform (DCT) and Discrete Wavelet Transform (DWT) is proposed. In this method, RGB …
An imperceptible LSB image hiding on edge region using DES encryption
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus,
due to reducing the risk, data security techniques should be implemented. Data security …
due to reducing the risk, data security techniques should be implemented. Data security …
Payload enhancement on least significant bit image steganography using edge area dilation
DRIM Setiadi - International Journal of Electronics and …, 2019 - yadda.icm.edu.pl
This research proposes a method to enhance the payload message by embedding
messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …
messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …
A good performance OTP encryption image based on DCT-DWT steganography
WS Sari, EH Rachmawanto… - … Electronics and Control), 2017 - telkomnika.uad.ac.id
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed …
steganography and cryptography. Surely research on this should continue to be developed …
A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size
EH Rachmawanto, CA Sari - 2017 International Seminar on …, 2017 - ieeexplore.ieee.org
Many people have used the internet in daily communication. The rise of internet data theft
makes the security of data transmission becomes very important. Cryptography and …
makes the security of data transmission becomes very important. Cryptography and …
Hiding and securing message on edge areas of image using LSB steganography and OTP encryption
Imperceptibility and security are the two most important things in StegoCrypt techniques. In
this paper, we have proposed the technique of inserting messages to the edge of the image …
this paper, we have proposed the technique of inserting messages to the edge of the image …
Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm
G Ardiansyah, CA Sari… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Public networks such as the Internet are becoming more sophisticated, faster, and cheaper,
so that more and more used for information exchange. This may increase the likelihood of …
so that more and more used for information exchange. This may increase the likelihood of …
A secure image watermarking using Chinese remainder theorem based on haar wavelet transform
U Sudibyo, F Eranisa… - 2017 4th International …, 2017 - ieeexplore.ieee.org
This study proposed concealment of information through watermarking techniques using a
combination of Haar Wavelet Transform (HWT) and Chinese Remainder Theorem (CRT) …
combination of Haar Wavelet Transform (HWT) and Chinese Remainder Theorem (CRT) …
Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS
F Zeng, H Bai, K Xiao - Security and Privacy, 2022 - Wiley Online Library
In order to solve the contradiction between watermark transparency and robustness, this
paper combines Non‐subsampled Contourlet Transformation (NSCT), Discrete Wavelet …
paper combines Non‐subsampled Contourlet Transformation (NSCT), Discrete Wavelet …