Novel medical image encryption using DWT block-based scrambling and edge maps
S Jeevitha, N Amutha Prabha - Journal of Ambient Intelligence and …, 2021 - Springer
This paper proposes the discrete wavelet transform (DWT) block-based scrambling
algorithm used for medical image encryption which applies the edge maps extracted from a …
algorithm used for medical image encryption which applies the edge maps extracted from a …
Analysis review on spatial and transform domain technique in digital steganography
This paper presents several techniques used in digital steganography in term of spatial and
transform domain. Additionally, it analyses the performance and the metric evaluation of the …
transform domain. Additionally, it analyses the performance and the metric evaluation of the …
A comprehensive study of digital image steganographic techniques
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …
modern digital arena calls for robust information hiding techniques and, thus, it has always …
Framework for video steganography using integer wavelet transform and JPEG compression
In today's world of computers everyone is communicating their personal information through
the web. So, the security of personal information is the main concern from the research point …
the web. So, the security of personal information is the main concern from the research point …
Effective payload and improved security using HMT Contourlet transform in medical image steganography
S Jeevitha, N Amutha Prabha - Health and Technology, 2020 - Springer
This paper implements a novel approach for image steganography based on Hidden
Markov Tree (HMT) Contourlet transform. In this paper, the biomedical image considers as a …
Markov Tree (HMT) Contourlet transform. In this paper, the biomedical image considers as a …
[PDF][PDF] High-security image steganography technique using XNOR operation and fibonacci algorithm
AA Almayyahi, R Sulaiman, F Qamar… - International Journal of …, 2020 - researchgate.net
Since the number of internet users is increasing and sensitive information is exchanging
continuously, data security has become a problem. Image steganography is one of the ways …
continuously, data security has become a problem. Image steganography is one of the ways …
Analisis Histogram Steganografi Least Significant Bit Pada Citra Grayscale
NF Hasan, CN Dengen… - Digital Zone: Jurnal …, 2020 - pustaka-psm.unilak.ac.id
Kesadaran pentingnya keamanan data pada era digital saat ini ditandai dengan
berkembangnya aplikasi keamanan data. Pada penelitian ini akan dilakukan analisis …
berkembangnya aplikasi keamanan data. Pada penelitian ini akan dilakukan analisis …
[PDF][PDF] A comprehensive study of digital image steganographic techniques
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …
modern digital arena calls for robust information hiding techniques and, thus, it has always …
[PDF][PDF] Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression. Future Internet 2022, 14, 254
In today's world of computers everyone is communicating their personal information through
the web. So, the security of personal information is the main concern from the research point …
the web. So, the security of personal information is the main concern from the research point …
[PDF][PDF] Digital Rights Management of Images Using Quadrinacci Sequence and LSB Embedding
M Gamal - 2023 - researchgate.net
As the use of technology escalates, so does the volume of data generated; hence, protecting
data transfer between communication parties has become a necessity. The main …
data transfer between communication parties has become a necessity. The main …