Video steganography: A review

Y Liu, S Liu, Y Wang, H Zhao, S Liu - Neurocomputing, 2019 - Elsevier
Video steganography is becoming an important research area in various data hiding
technologies, which has become a promising tool because not only the security requirement …

A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain

E Avci, T Tuncer, D Avci - Arabian Journal for Science and Engineering, 2016 - Springer
In recent years, a lot of data hiding algorithms have been proposed in the literature.
Providing high payload capacity, high visual quality, and robustness is the main aim of data …

On Multi-image Random Grids by Arbitrary Transformations

N Buckley, AK Nagar, EL Secco - Human-Centric Intelligent Systems, 2024 - Springer
Random grids are a method for visual secret sharing, whereby a secret image is encoded
into a number of shares, each of which is maximally entropic. There has been growing …

Multiple Information Hiding in General Access Structure Visual Cryptography Using Q'tron Neural Network

S Gurung, M Chakravorty - … of International Conference on ICACCP 2017 …, 2018 - Springer
With the advent of the widespread use of Internet for communication, there is an increase in
exchange of personal secured information via the Internet wherein a large variety of …

Binary Image Random Grid (2, n)-Visual Cryptography Scheme

DS Degadwala, D Vyas, A Mahajan - Proceedings of International …, 2019 - papers.ssrn.com
Majority of the data security ensures scientific systems. What's more related viewpoints on
furnish for confidentiality, information security, substance Con-firmation Furthermore …

Color Image Encryption by Random Circular Visual Cryptography

VH Borkhatariya, YB Shukla… - Think India Journal, 2019 - thinkindiaquarterly.org
Abstract Information security is the most important part in the research and development
area, government, industry, organization, etc. Recently, cybercrime or related hacking …

[PDF][PDF] Secret sharing scheme Circular Visual Cryptography for Color Images

S Parmar, SD Degadwala - 2019 - academia.edu
Data security is the most significant part of the innovative work territory, government,
industry, association, and so forth. As of late, cybercrime or related hacking issue increments …

Self-organizing patterns in information hiding applications

M Vaidelys - 2018 - epubl.ktu.edu
The importance of hiding information when transferring data has been highlighted since the
early days of communication. Even though initially information hiding was mainly used in …

[CITAS][C] Encrypting Binary and Gray-scale Images Using RandomCircular Visual Cryptography

BK Bhardwaj, T Singh, K Gupta, H Pandey, A Tiwari - RES MILITARIS, 2023