Secure reversible data hiding using block-wise histogram shifting

S Kamil Khudhair, M Sahu, R KR, AK Sahu - Electronics, 2023‏ - mdpi.com
Reversible data hiding (RDH) techniques recover the original cover image after data
extraction. Thus, they have gained popularity in e-healthcare, law forensics, and military …

Hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: A review

NN Mohamed, YM Yussoff, MA Saleh… - Journal of Information …, 2020‏ - e-journal.uum.edu.my
Cryptography is described as the study of encrypting or secretCryptography is described as
the study of encrypting or secretwriting of data using logical and mathematical principles …

An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption

A Gupta, D Singh, M Kaur - Journal of Ambient Intelligence and …, 2020‏ - Springer
Chaotic maps are extensively utilized in the field of image encryption to generate secret
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …

An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography

C Biswas, UD Gupta, MM Haque - … international conference on …, 2019‏ - ieeexplore.ieee.org
Data/information is the most valuable asset for the modern electronic communication
system. To secure data or information has become a challenge in this competitive world …

Secure non real time image encryption algorithm development using cryptography & steganography

M Mukhedkar, P Powar… - 2015 Annual IEEE India …, 2015‏ - ieeexplore.ieee.org
In the current technology world, data transmission of various multimedia like sensitive
images, video, text is very important and security is major concern in the fields of medical …

[PDF][PDF] A survey on recent approaches combining cryptography and steganography

S Almuhammadi, A Al-Shaaby - Computer Science Information …, 2017‏ - airccj.org
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The …

[PDF][PDF] A systematic overview of secure image steganography

BT Ahmed - International Journal of Advances in Applied Sciences …, 2021‏ - academia.edu
Information is a vital thing that needs to be secured and well protected during transmission
between two or more parties over the internet. This can be achieved by steganography …

Achieving data integrity and confidentiality using image steganography and hashing techniques

A Hambouz, Y Shaheen, A Manna… - … conference on new …, 2019‏ - ieeexplore.ieee.org
Most existing steganography algorithms keen on achieving data confidentiality only by
embedding the data into a cover-media. This research paper introduced a new …

[HTML][HTML] An Efficient Steganographic Protocol for WebP Files

K Koptyra, MR Ogiela - Applied Sciences, 2023‏ - mdpi.com
Featured Application The methods of digital steganography in image files presented in this
research may find application in numerous areas and industries, because they offer great …

Secure E-health using images steganography

T Manikandan, A Muruganandham… - Journal of physics …, 2021‏ - iopscience.iop.org
The main aim is to secure the medical records by ensuring safe communication between the
sender and the receiver by adding multiple layers of security. This project is a combined …