We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,514 results
  1. Image Steganography Method for Securing Multiple Images Using LSB–GA

    Image steganography is renowned for its flexibility and frequency in the current scenario. This article presents a combination of LSB (Least...

    Palanichamy Naveen, R. Jayaraghavi in Wireless Personal Communications
    Article 30 March 2024
  2. Robust JPEG steganography based on the robustness classifier

    Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular...

    Jimin Zhang, **anfeng Zhao, **aolei He in EURASIP Journal on Information Security
    Article Open access 11 December 2023
  3. Robust steganography in practical communication: a comparative study

    To realize the act of covert communication in a public channel, steganography is proposed. In the current study, modern adaptive steganography plays...

    Tong Qiao, Shengwang Xu, ... Binmin Pan in EURASIP Journal on Image and Video Processing
    Article Open access 31 October 2023
  4. Methodologies in Steganography and Cryptography–Review

    Today we are living in a digital world. The transfer of data via an unsafe channel is becoming a crucial subject. And simultaneously cybercriminals...
    Chapter 2024
  5. A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

    During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information...

    Fredy Varghese, P. Sasikala in Wireless Personal Communications
    Article 27 March 2023
  6. Advancement on Steganography: A Review

    There have been numerous advancements in information exchange and covert information exchange in recent years by virtue of the various methodologies...
    Ayesha Arshad, Nadia Siddiqui, Saiful Islam in Data Science and Applications
    Conference paper 2024
  7. Application of target-optimized image steganography algorithm for fine art sculpture design

    Fine art sculpture refers to decorative objects and commemorative objects shaped to beautify the environment or memorial meaning, and have a certain...

    Yu Meng in Soft Computing
    Article 10 August 2023
  8. Digital image steganography: challenges, investigation, and recommendation for the future direction

    Performance measurements which characterize digital image steganography techniques include payload capacity, stego image quality, and security...

    Alan Anwer Abdulla in Soft Computing
    Article 01 September 2023
  9. A privacy protection scheme for green communication combining digital steganography

    In order to ensure the sustainable development of the Internet of Things (IoT), researchers have been exploring and making technological innovations...

    Pengbiao Zhao, Bintao Wang, ... Kim-Kwang Raymond Choo in Peer-to-Peer Networking and Applications
    Article 22 May 2024
  10. Review on Image Steganography Transform Domain Techniques

    In today’s society, data security is of the utmost importance. Securing data by ensuring confidentiality and integrity is crucial. Security of...
    G. Gnanitha, A. Swetha, ... B. Lakshmi Sirisha in Intelligent Manufacturing Systems in Industry 4.0
    Conference paper 2023
  11. An adaptive steganography insertion technique based on wavelet transform

    Over the past few decades, there have been several successful methods developed for steganography. One popular technique is the insertion method,...

    Taif Alobaidi, Wasfy Mikhael in Journal of Engineering and Applied Science
    Article Open access 23 November 2023
  12. A Systematic Review of Computational Image Steganography Approaches

    With the rapid growth of multimedia technologies, many images are communicated over public channels. Therefore, significant interest has been given...

    Sharanpreet Kaur, Surender Singh, ... Heung-No Lee in Archives of Computational Methods in Engineering
    Article 14 June 2022
  13. Steganography using wavelet transform for secured data transmission

    The secure transfer of data (alphanumeric and byte data) is critical in information technology. In general, cryptography is used to safeguard data...

    Lingamallu Naga Srinivasu, Vijayaraghavan Veeramani in Journal of Ambient Intelligence and Humanized Computing
    Article 24 May 2023
  14. Image Steganography Using Particle Swarm Optimization

    Any mode of communication must prioritize information security and confidentiality. The methods for using covert digital material like text, audio,...
    Sujeet Kumar, Shejal Pujari, ... Ishaan R. Kale in Intelligent Systems for Smart Cities
    Conference paper 2024
  15. Digital Video Steganography: An Overview

    The recent evolution of digital communication demands securing the integrity of data transfer. Under such necessity, the data hiding practice,...
    Suganthi Kumar, Rajkumar Soundrapandiyan in Computational Methods and Data Engineering
    Conference paper 2023
  16. Video Steganography Techniques: A Comprehensive Review and Performance Evaluation

    This paper discusses various steganography techniques and their parameters. Based on these parameters, we make some comparative analysis among...
    Hemant Kumar, Pushpa Mamoria, ... Manoj Kumar Misra in Cryptology and Network Security with Machine Learning
    Conference paper 2024
  17. Involving Spaces of Unicode Standard Within Irreversible Arabic Text Steganography for Practical Implementations

    This paper introduces a novel method for Arabic text steganography for irreversible practical usage that involves using the spaces in Unicode...

    Norah Alanazi, Esam Khan, Adnan Gutub in Arabian Journal for Science and Engineering
    Article 11 May 2021
  18. Steganography

    Steganography is not strictly speaking cryptography. It is, however, closely related. Modern steganography depends on algorithms to hide one message...
    Chuck Easttom in Modern Cryptography
    Chapter 2022
  19. Notes on Image Watermarking and Steganography

    Digital information can be reproduced, duplicated, and distributed easily which makes information hiding like image watermarking and steganography as...
    Conference paper 2023
  20. Reversible Image Steganography Using Deep Learning Method: A Review

    In this paper, a complete study of reversible image steganography utilizing deep learning techniques is presented. Additionally, the traditional...
    Jyoti Khandelwal, Vijay Kumar Sharma in Human-Centric Smart Computing
    Conference paper 2024
Did you find what you were looking for? Share feedback.