[PDF][PDF] Steganography in images using LSB technique
This paper, a novel data-hiding technique based on the LSB technique of digital images is
presented. Data hiding is one of best topic in secret communication. A lossless data hiding …
presented. Data hiding is one of best topic in secret communication. A lossless data hiding …
[PDF][PDF] Image steganography using least significant bits (LSBs): a novel algorithm
AGT Al-Tamimi, AA Alqobaty - International Journal of Computer …, 2015 - academia.edu
Steganography plays a major role in data communication security. It focuses on hiding the
fact that communication is taking place by hiding information in other information. The least …
fact that communication is taking place by hiding information in other information. The least …
[PDF][PDF] Comparison of various Edge Detection Techniques for maximum data hiding using LSB Algorithm
S Sarkar, A Basu - International Journal of Computer Science and …, 2014 - Citeseer
Steganography is the art of hiding information. It is derived from the Greek word
''Steganos''which means covered writing, a science of secret communication. It is a tool for …
''Steganos''which means covered writing, a science of secret communication. It is a tool for …
Analysis of steganography techniques using least significant bit in grayscale images and its extension to colour images
A Rashid, MMS Missen… - Journal of …, 2015 - article.journalrepositoryarticle.com
Image steganography conceals the furtive information into images in such a way that
perceptually images are impossible to differentiate and visual features remains similar, but …
perceptually images are impossible to differentiate and visual features remains similar, but …
[PDF][PDF] Local features-based watermarking for image security in social media
Y Shady, AM Yassen, AK Alsammak… - CMC-Comput. Mater …, 2021 - researchgate.net
The last decade shows an explosion of using social media, which raises several challenges
related to the security of personal files including images. These challenges include …
related to the security of personal files including images. These challenges include …
Experimental analysis and comparison of LSB substitution and LSB matching method of information security
A Rashid - International Journal of Computer Science Issues …, 2015 - search.proquest.com
Steganography is an art of covert communications. Its core function is to conceal the
occurrence of communication over a civic channel. Hiding the occurrence of communication …
occurrence of communication over a civic channel. Hiding the occurrence of communication …
[PDF][PDF] Steganography and cryptography approaches combined using medical digital images
M Trehan, S Mittu - International Journal of Engineering Research & …, 2015 - academia.edu
The growth in medical field has led to the transformation of the data from papers into the
digital form. As the medical field is moving towards the digital world, security of the medical …
digital form. As the medical field is moving towards the digital world, security of the medical …
[PDF][PDF] Experimental analysis of matching technique of steganography for Greyscale and colour image
KR Rashid, A Rashid, N Salamat… - International Journal of …, 2014 - researchgate.net
Steganography and steganalysis are vital matter in information hiding. Steganography refers
to the technology of hiding data into digital media without depiction of any misgiving, while …
to the technology of hiding data into digital media without depiction of any misgiving, while …
Video steganography with LSB color detection
A Suttichaiya, Y Sombatkiripaiboon… - Journal of …, 2017 - jtec.utem.edu.my
Steganography is the method employed to prevent unsolicited access and malicious use of
sensitive information. This research proposes an alternative approach to video …
sensitive information. This research proposes an alternative approach to video …
An Approach to secure data transmission through the use of cryptography and steganography
KM Shenoy, SG Shaikh - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
In this paper, an approach to transfer data securely is proposed. First, from the sender side,
the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted …
the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted …