A novel steganography technique for digital images using the least significant bit substitution method

S Rahman, J Uddin, HU Khan, H Hussain… - IEEE …, 2022 - ieeexplore.ieee.org
Communication has become a lot easier in this era of technology, development of high-
speed computer networks, and the inexpensive uses of Internet. Therefore, data …

Hide text in an image using Blowfish algorithm and development of least significant bit technique

S Salim, M Msallam, H Olewi - Indonesian Journal of Electrical …, 2023 - avesis.ankara.edu.tr
Recently, there is increasing interest in data transfer between many different devices. Data
must be encrypted before being sent so that the intended receiver can only read it to prevent …

Securing medical images using chaotic map encryption and LSB steganography

AZ Hussain - Revue d'Intelligence Artificielle, 2024 - search.proquest.com
Secure image transfer is a difficult topic in the age of communication technology because
millions of people utilize and share images online for personal and professional reasons …

Data hiding by unsupervised machine learning using clustering K-mean technique

HH Hassan, MAA Khodher - IRAQI JOURNAL OF …, 2021 - ijccce.uotechnology.edu.iq
Steganography includes hiding text, image, or any sentient information inside another
image, video, or audio. It aims to increase individuals' use of social media, the internet and …

[PDF][PDF] A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique

YA Hassan, AMS Rahma - IRAQI JOURNAL OF COMPUTERS …, 2023 - iasj.net
Since the Internet has been more widely used and more people have access to multimedia
content, copyright hacking, and piracy have risen. By the use of watermarking techniques …

A Secure Fingerprint Hiding Technique Based on DNASequence

A Aljahdali, A Munshi - 2023 - researchsquare.com
DNA steganography is a technique that utilizes the DNA sequence as the basis for the
secure transmission of critical data. This technique consists mainly of encrypting and hiding …

[PDF][PDF] Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography

MH Jebur, FA Joda, MA Naser - Baghdad Science Journal, 2023 - iasj.net
Video steganography has become a popular option for protecting secret data from hacking
attempts and common attacks on the internet. However, when the whole video frame (s) are …

Robust image data hiding method based on multiple backups and pixel bit weight

Y Dong, X Zhang, C Yu, Z Tang… - Journal of Intelligent & …, 2021 - content.iospress.com
Digital images are easily corrupted by attacks during transmission and most data hiding
methods have limitations in resisting cropping and noise attacks. Aiming at this problem, we …

[PDF][PDF] An Enhanced Data Transmission in Mobile Banking Using LSB-AES Algorithm

DO Orucho, FM Awuor, R Makiya, C Oduor - Asian J. Res. Com. Sci, 2023 - academia.edu
The advent of mobile banking applications has transformed the way customers' access
banking services from brick-and-mortar to remote banking. The ubiquitous nature of this …

Detección automática de mensaje de texto oculto en un archivo de audio digital

L Salazar Aguilar - 2023 - repositorio.uss.edu.pe
En la actualidad la delincuencia cibernética se adapta a los avances de la tecnología,
donde el robo de información en entidades estales y privadas se realiza enviando …