A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

A study on secret data sharing through coverless steganography

S Debnath, RK Mohapatra - 2022 2nd International Conference …, 2022 - ieeexplore.ieee.org
The basic fundamental of steganography is to conceal the confidential data in designated
cover media which will carry the secret message in such a way that no one can suspect it …

[PDF][PDF] A survey paper on steganography techniques

RL Biradar, A Umashetty - High Impact Factor, 2016 - academia.edu
Steganography is going to gain its importance due to the exponential growth and secret
communication of potential computer users over the internet. It can also be defined as the …

[PDF][PDF] Information hiding using chaotic-address steganography

ON Kadhim, ZM Hussain - J. Comput. Sci, 2018 - repository.atu.edu.iq
In this study, two techniques are introduced for image steganography in the spatial domain.
These systems employ chaos theory to track the addresses of shuffled bits in …

A study to improve image steganography using linear feedback shift register

M Shunnar, A Othman, A Awad - … International Conference on …, 2022 - ieeexplore.ieee.org
Concealing data during communicating is often a security requirement. Image
steganography is one way to do that by hiding data in the cover image. Least Significant Bit …

[PDF][PDF] Image in image steganography technique based on arnold transform and LSB algorithms

SA Al-Taweel, MH Al-Hada… - International Journal of …, 2018 - academia.edu
Computer security, for quite a long time, was almost a limited field of study which was mainly
the concern of theoretical computer scientists, electrical engineers, and applied …

[PDF][PDF] Robust watermarking of color images under noise and cropping attacks in spatial domain

A Aggarwal, M Singla - image, 2011 - Citeseer
In this paper a novel spatial domain multiple watermarking scheme for color Images is
proposed. The proposed scheme is of type blind and invisible watermarking. A binary …

[PDF][PDF] Steganography: A Flexible Embedded Randomization Technique.

KH Abuhmaidan, AK Kayed… - KSII Transactions on …, 2023 - koreascience.kr
With the expansion of digital communication networks, a considerable number of
randomization techniques have been invented and implemented to enhance the different …

[PDF][PDF] A comprehensive study of digital image steganographic techniques

H Hussain, AA Khan, A Ahmed… - IEEE Access https://doi …, 2023 - academia.edu
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

Application of steganography imaging by AES and random bit

A Harika, S Anamalamudi, S Humayra… - 2021 13th …, 2021 - ieeexplore.ieee.org
The goal of steganography is to hide the data in another medium, meaning disguising the
data, so that the existence of the messages can be concealed. Steganography can be …