Steganography literature survey, classification and comparative study

A Fkirin, G Attiya, A El-Sayed - Communications on Applied …, 2016 - caeaccess.org
Transmitting confidential images between two channels suffer from hacking. Therefore,
protecting confidentiality has become a very essential issue. Recently, several methods are …

Analysis of attacks on hybrid DWT-DCT algorithm for digital image watermarking with MATLAB

LK Saini, V Shrivastava - arXiv preprint arXiv:1407.4738, 2014 - arxiv.org
Watermarking algorithms needs properties of robustness and perceptibility. But these
properties are affected by different-2 types of attacks performed on watermarked images …

[PDF][PDF] A Suvery on DWT-DCT Based RST Attacks Invariant Watermarking Approach

RN Baria, MM Goyani - 2019 - researchgate.net
Accepted: 09/Mar/2019, Published: 31/Mar/2019 Abstract—Digital Image Security is still
recent topic of research in computer science engineering. Images are being shared from …

TECHNIQUES DE DISSIMULATION DE L'INFORMATION: APPLICATION A LA STEGANALYSE ET A LA COMPRESSION MULTIMODALE

BM BEDDIAFI Razika - 2019 - dspace.univ-guelma.dz
Le travail présenté a pour objectif d'étudier et d'analyser des techniques pouvant dissimuler
une ou plusieurs informations afin d'assurer une sécurisation des données numériques, car …

[引用][C] Hybrid DWT-DCT Algorithm for Digital Image Watermarking and Compression Applications

A Venkateswarlu, VSK Reddy, NU Rani - IOSR Journal of Electronics and …, 2014