The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

A survey on healthcare data: a security perspective

AK Singh, A Anand, Z Lv, H Ko, A Mohan - ACM Transactions on …, 2021 - dl.acm.org
With the remarkable development of internet technologies, the popularity of smart healthcare
has regularly come to the fore. Smart healthcare uses advanced technologies to transform …

Blind dual watermarking for color images' authentication and copyright protection

XL Liu, CC Lin, SM Yuan - … on circuits and systems for video …, 2016 - ieeexplore.ieee.org
This paper presents a blind dual watermarking mechanism for digital color images in which
invisible robust watermarks are embedded for copyright protection and fragile watermarks …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …

Review on spatial domain image steganography techniques

B Lakshmi Sirisha… - Journal of Discrete …, 2021 - Taylor & Francis
Steganography techniques leads main role in embedding process of secret information into
cover information in order to provide good security. These techniques are very essential …

A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm

HR Kanan, B Nazeri - Expert systems with applications, 2014 - Elsevier
Steganography is knowledge and art of hiding secret data into information which is largely
used in information security systems. Various methods have been proposed in the literature …

A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression

JC Patra, JE Phua, C Bornand - Digital Signal Processing, 2010 - Elsevier
Digital watermarking techniques have been proposed for copyright protection and
authentication of multimedia data. In this paper, we propose a novel Chinese Remainder …

SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images

S Arunkumar, V Subramaniyaswamy, V Vijayakumar… - Measurement, 2019 - Elsevier
The advances in computer technologies and the Internet have made rapid strides and
breakthroughs in the field of data communication, which nowadays, is easily accessed …

Reversible image secret sharing

X Yan, Y Lu, L Liu, X Song - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
In reversible image secret sharing (RISS), the cover image can be recovered to some
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …

A common method of share authentication in image secret sharing

X Yan, Y Lu, CN Yang, X Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Because of the importance of digital images and their extensive application to digital
watermarking, block chain, access control, identity authentication, distributive storage in the …