Search
Search Results
-
Image Steganography Method for Securing Multiple Images Using LSB–GA
Image steganography is renowned for its flexibility and frequency in the current scenario. This article presents a combination of LSB (Least...
-
Robust JPEG steganography based on the robustness classifier
Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular...
-
Robust steganography in practical communication: a comparative study
To realize the act of covert communication in a public channel, steganography is proposed. In the current study, modern adaptive steganography plays...
-
Methodologies in Steganography and Cryptography–Review
Today we are living in a digital world. The transfer of data via an unsafe channel is becoming a crucial subject. And simultaneously cybercriminals... -
A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information...
-
Advancement on Steganography: A Review
There have been numerous advancements in information exchange and covert information exchange in recent years by virtue of the various methodologies... -
Application of target-optimized image steganography algorithm for fine art sculpture design
Fine art sculpture refers to decorative objects and commemorative objects shaped to beautify the environment or memorial meaning, and have a certain...
-
Digital image steganography: challenges, investigation, and recommendation for the future direction
Performance measurements which characterize digital image steganography techniques include payload capacity, stego image quality, and security...
-
A privacy protection scheme for green communication combining digital steganography
In order to ensure the sustainable development of the Internet of Things (IoT), researchers have been exploring and making technological innovations...
-
Review on Image Steganography Transform Domain Techniques
In today’s society, data security is of the utmost importance. Securing data by ensuring confidentiality and integrity is crucial. Security of... -
An adaptive steganography insertion technique based on wavelet transform
Over the past few decades, there have been several successful methods developed for steganography. One popular technique is the insertion method,...
-
A Systematic Review of Computational Image Steganography Approaches
With the rapid growth of multimedia technologies, many images are communicated over public channels. Therefore, significant interest has been given...
-
Steganography using wavelet transform for secured data transmission
The secure transfer of data (alphanumeric and byte data) is critical in information technology. In general, cryptography is used to safeguard data...
-
Image Steganography Using Particle Swarm Optimization
Any mode of communication must prioritize information security and confidentiality. The methods for using covert digital material like text, audio,... -
Digital Video Steganography: An Overview
The recent evolution of digital communication demands securing the integrity of data transfer. Under such necessity, the data hiding practice,... -
Video Steganography Techniques: A Comprehensive Review and Performance Evaluation
This paper discusses various steganography techniques and their parameters. Based on these parameters, we make some comparative analysis among... -
Involving Spaces of Unicode Standard Within Irreversible Arabic Text Steganography for Practical Implementations
This paper introduces a novel method for Arabic text steganography for irreversible practical usage that involves using the spaces in Unicode...
-
Steganography
Steganography is not strictly speaking cryptography. It is, however, closely related. Modern steganography depends on algorithms to hide one message... -
Notes on Image Watermarking and Steganography
Digital information can be reproduced, duplicated, and distributed easily which makes information hiding like image watermarking and steganography as... -
Reversible Image Steganography Using Deep Learning Method: A Review
In this paper, a complete study of reversible image steganography utilizing deep learning techniques is presented. Additionally, the traditional...