Blowfish–secured audio steganography

F Hemeida, W Alexan… - 2019 Novel Intelligent and …, 2019 - ieeexplore.ieee.org
Data security has become essential to provide secure communication that is free of attacks.
A combination of steganography and cryptography provides very secure communication …

Deep learning for real-time image steganalysis: a survey

F Ruan, X Zhang, D Zhu, Z Xu, S Wan, L Qi - Journal of Real-Time Image …, 2020 - Springer
Steganography is a technique that transmits secret data or message in an appropriate
multimedia carrier, eg, image, audio, and video files. It comes under the assumption that if …

[PDF][PDF] Hiding an image inside another image using variable-rate steganography

AA Tamimi, AM Abdalla, O Al-Allaf - International Journal of Advanced …, 2013 - Citeseer
A new algorithm is presented for hiding a secret image in the least significant bits of a cover
image. The images used may be color or grayscale images. The number of bits used for …

Metamorphic cryptography using strength of chaotic sequence and XORing method

MC Trivedi, S Mishra, VK Yadav - Journal of Intelligent & …, 2017 - content.iospress.com
The Data hiding concept such as steganography can provide security and facilitate the safe
exchange of important information in the digital world. This concept can be used with the …

Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography

PS Venugopala, S Raghavendra, V Kubihal - IEEE Access, 2024 - ieeexplore.ieee.org
Steganography plays a vital role in securing sensitive information within digital
communication channels. It has the ability to hide data and protect information effectively …

[PDF][PDF] A novel secure image steganography using improved logistic map and DNA techniques

S Sun - J. Internet Technol, 2017 - researchgate.net
In this paper a secure steganography algorithm which is based on improved logistic map
and DNA sequence is proposed. Canny edge detection is also utilized in this new scheme …

A novel technique for data hiding in audio carrier by using sample comparison in DWT domain

SS Verma, R Gupta… - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
Steganography has proven to be one of the practical ways of securing data. It is a new kind
of secret communication used mainly to hide secret data inside other innocent digital …

Sequential multiple LSB methods and real-time data hiding: variations for visual cryptography ciphers

NA Papadopoulos, KE Psannis - Journal of Real-Time Image Processing, 2018 - Springer
In this paper, a general model approach of real-time data hiding and watermarking for
image, video and audio communications is proposed. The aim is the development of …

A comparative analysis of audio steganography methods and tools

PM Reyers - 2023 - essay.utwente.nl
Steganography is the process of hiding data within other data. Unlike cryptography which
aims to secure data through obscuring its meaning, steganography aims to secure data by …

Image cryptosystem based on plain image correlation rate and selective chaotic maps

AP Kari, AH Navin, AM Bidgoli, M Mirnia - Multimedia Tools and …, 2022 - Springer
In this paper, a new image encryption algorithm is introduced for encrypting grayscale digital
images of any size. To improve the encryption evaluation parameters, we suggested that the …