A comprehensive study of digital image steganographic techniques
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …
modern digital arena calls for robust information hiding techniques and, thus, it has always …
A study on secret data sharing through coverless steganography
S Debnath, RK Mohapatra - 2022 2nd International Conference …, 2022 - ieeexplore.ieee.org
The basic fundamental of steganography is to conceal the confidential data in designated
cover media which will carry the secret message in such a way that no one can suspect it …
cover media which will carry the secret message in such a way that no one can suspect it …
[PDF][PDF] A survey paper on steganography techniques
RL Biradar, A Umashetty - High Impact Factor, 2016 - academia.edu
Steganography is going to gain its importance due to the exponential growth and secret
communication of potential computer users over the internet. It can also be defined as the …
communication of potential computer users over the internet. It can also be defined as the …
[PDF][PDF] Information hiding using chaotic-address steganography
ON Kadhim, ZM Hussain - J. Comput. Sci, 2018 - repository.atu.edu.iq
In this study, two techniques are introduced for image steganography in the spatial domain.
These systems employ chaos theory to track the addresses of shuffled bits in …
These systems employ chaos theory to track the addresses of shuffled bits in …
A study to improve image steganography using linear feedback shift register
M Shunnar, A Othman, A Awad - … International Conference on …, 2022 - ieeexplore.ieee.org
Concealing data during communicating is often a security requirement. Image
steganography is one way to do that by hiding data in the cover image. Least Significant Bit …
steganography is one way to do that by hiding data in the cover image. Least Significant Bit …
[PDF][PDF] Image in image steganography technique based on arnold transform and LSB algorithms
SA Al-Taweel, MH Al-Hada… - International Journal of …, 2018 - academia.edu
Computer security, for quite a long time, was almost a limited field of study which was mainly
the concern of theoretical computer scientists, electrical engineers, and applied …
the concern of theoretical computer scientists, electrical engineers, and applied …
[PDF][PDF] Robust watermarking of color images under noise and cropping attacks in spatial domain
A Aggarwal, M Singla - image, 2011 - Citeseer
In this paper a novel spatial domain multiple watermarking scheme for color Images is
proposed. The proposed scheme is of type blind and invisible watermarking. A binary …
proposed. The proposed scheme is of type blind and invisible watermarking. A binary …
[PDF][PDF] Steganography: A Flexible Embedded Randomization Technique.
KH Abuhmaidan, AK Kayed… - KSII Transactions on …, 2023 - koreascience.kr
With the expansion of digital communication networks, a considerable number of
randomization techniques have been invented and implemented to enhance the different …
randomization techniques have been invented and implemented to enhance the different …
[PDF][PDF] A comprehensive study of digital image steganographic techniques
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …
modern digital arena calls for robust information hiding techniques and, thus, it has always …
Application of steganography imaging by AES and random bit
A Harika, S Anamalamudi, S Humayra… - 2021 13th …, 2021 - ieeexplore.ieee.org
The goal of steganography is to hide the data in another medium, meaning disguising the
data, so that the existence of the messages can be concealed. Steganography can be …
data, so that the existence of the messages can be concealed. Steganography can be …