A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

Framework for video steganography using integer wavelet transform and JPEG compression

U Pilania, R Tanwar, M Zamani, AA Manaf - Future Internet, 2022 - mdpi.com
In today's world of computers everyone is communicating their personal information through
the web. So, the security of personal information is the main concern from the research point …

Data Hiding Technique for Color Images using Pixel Value Differencing and Chaotic Map

NIR Yassin - Jordanian Journal of Computers and Information …, 2022 - search.proquest.com
The huge advance in information technology and communication has resulted in the
growing usage of digital networks, which consequently handed an important role to …

[PDF][PDF] An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images.

RB Krishnan, D Yuvaraj, PS Devi… - … Systems Science & …, 2023 - cdn.techscience.cn
With the improvement of current online communication schemes, it is now possible to
successfully distribute and transport secured digital Content via the communication channel …

[PDF][PDF] A comprehensive study of digital image steganographic techniques

H Hussain, AA Khan, A Ahmed… - IEEE Access https://doi …, 2023 - academia.edu
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

[PDF][PDF] Hybrid Compression and DNA Sequence of Hyper Chaos System for Medical Image Steganography.

V Seenappa, NC Krishnappa, PK Mallesh - International Journal of …, 2022 - inass.org
Image Steganography is required in the medical field to protect the information of patients
and sensitive data. The existing methods in image steganography have the limitation of …

An Investigation of Image Security and Image Steganography Techniques

D Thangaraju, R Asokan - 2023 Second International …, 2023 - ieeexplore.ieee.org
In recent days, data transmission has increased a lot and they demand high security
protocols for the safe transmission of data. Among the different types of data, images are …

[PDF][PDF] Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression. Future Internet 2022, 14, 254

U Pilania, R Tanwar, M Zamani, AA Manaf - 2022 - academia.edu
In today's world of computers everyone is communicating their personal information through
the web. So, the security of personal information is the main concern from the research point …

A Novel Approach to Image Steganography: A Fusion of Chaotic and Genetic Algorithms for Unbreakable Data Hiding

D Thangaraju, R Asokan - 2024 - researchsquare.com
Image steganography comprises concealing sensitive data inside digital images to ensure
secure communication. In this work, a ground-breaking method for image steganography is …

A Fusion of Chaotic and Genetic Algorithms for Unbreakable Data Hiding

D Thangaraju, R Asokan - 2024 - researchsquare.com
Image steganography comprises concealing sensitive data inside digital images to ensure
secure communication. In this research we introduce a ground-breaking method for image …