A novel steganography technique for digital images using the least significant bit substitution method
Communication has become a lot easier in this era of technology, development of high-
speed computer networks, and the inexpensive uses of Internet. Therefore, data …
speed computer networks, and the inexpensive uses of Internet. Therefore, data …
Hide text in an image using Blowfish algorithm and development of least significant bit technique
Recently, there is increasing interest in data transfer between many different devices. Data
must be encrypted before being sent so that the intended receiver can only read it to prevent …
must be encrypted before being sent so that the intended receiver can only read it to prevent …
Securing medical images using chaotic map encryption and LSB steganography
AZ Hussain - Revue d'Intelligence Artificielle, 2024 - search.proquest.com
Secure image transfer is a difficult topic in the age of communication technology because
millions of people utilize and share images online for personal and professional reasons …
millions of people utilize and share images online for personal and professional reasons …
Data hiding by unsupervised machine learning using clustering K-mean technique
HH Hassan, MAA Khodher - IRAQI JOURNAL OF …, 2021 - ijccce.uotechnology.edu.iq
Steganography includes hiding text, image, or any sentient information inside another
image, video, or audio. It aims to increase individuals' use of social media, the internet and …
image, video, or audio. It aims to increase individuals' use of social media, the internet and …
[PDF][PDF] A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
Since the Internet has been more widely used and more people have access to multimedia
content, copyright hacking, and piracy have risen. By the use of watermarking techniques …
content, copyright hacking, and piracy have risen. By the use of watermarking techniques …
A Secure Fingerprint Hiding Technique Based on DNASequence
A Aljahdali, A Munshi - 2023 - researchsquare.com
DNA steganography is a technique that utilizes the DNA sequence as the basis for the
secure transmission of critical data. This technique consists mainly of encrypting and hiding …
secure transmission of critical data. This technique consists mainly of encrypting and hiding …
[PDF][PDF] Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
Video steganography has become a popular option for protecting secret data from hacking
attempts and common attacks on the internet. However, when the whole video frame (s) are …
attempts and common attacks on the internet. However, when the whole video frame (s) are …
Robust image data hiding method based on multiple backups and pixel bit weight
Digital images are easily corrupted by attacks during transmission and most data hiding
methods have limitations in resisting cropping and noise attacks. Aiming at this problem, we …
methods have limitations in resisting cropping and noise attacks. Aiming at this problem, we …
[PDF][PDF] An Enhanced Data Transmission in Mobile Banking Using LSB-AES Algorithm
The advent of mobile banking applications has transformed the way customers' access
banking services from brick-and-mortar to remote banking. The ubiquitous nature of this …
banking services from brick-and-mortar to remote banking. The ubiquitous nature of this …
Detección automática de mensaje de texto oculto en un archivo de audio digital
L Salazar Aguilar - 2023 - repositorio.uss.edu.pe
En la actualidad la delincuencia cibernética se adapta a los avances de la tecnología,
donde el robo de información en entidades estales y privadas se realiza enviando …
donde el robo de información en entidades estales y privadas se realiza enviando …