A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …
while in processing. However, it is not always the optimum choice as attackers know the …
Digital image steganography and steganalysis: A journey of the past three decades
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …
the study of uncovering the steganographic process. The evolution of steganography has …
Image steganography in spatial domain: A survey
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …
domain for last 5 years. The research community has already done lots of noteworthy …
A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques
MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …
major concern in the communication environment, where security must be performed for the …
A novel image steganographic method based on integer wavelet transformation and particle swarm optimization
Image steganography is a technique of hiding secret data into a cover image and so as to
prevent the intruders from accessing the secret data. The efficiency of image steganography …
prevent the intruders from accessing the secret data. The efficiency of image steganography …
Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage
P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …
proposes a double-matrix decomposition image steganography scheme with multi-region …
[PDF][PDF] Chaotic map based random image steganography using lsb technique.
S Rajendran, M Doraipandian - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
Steganography play an important role to transfer secret data over insecure network.
Moreover digital images are taken as a cover to communicate the sensitive data. One of the …
Moreover digital images are taken as a cover to communicate the sensitive data. One of the …
[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure
PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021 - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …
Cryptography can be used to secure the information, but it discloses the presence of covert …
ROI-based medical image watermarking for accurate tamper detection, localisation and recovery
D Ravichandran, P Praveenkumar… - Medical & Biological …, 2021 - Springer
Smart healthcare systems play a vital role in the current era of Internet of Things (IoT) and
Cyber-Physical Systems (CPS); ie Industry 4.0. Medical data security has become the …
Cyber-Physical Systems (CPS); ie Industry 4.0. Medical data security has become the …
A new steganography method which preserves histogram: Generalization of LSB++
K Qazanfari, R Safabakhsh - Information Sciences, 2014 - Elsevier
Histogram-based steganalysis methods diagnose abnormalities in the stego histogram.
LSB+ and outguess are two steganography methods which preserve the cover histogram …
LSB+ and outguess are two steganography methods which preserve the cover histogram …