The infinite race between steganography and steganalysis in images
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
A survey on healthcare data: a security perspective
With the remarkable development of internet technologies, the popularity of smart healthcare
has regularly come to the fore. Smart healthcare uses advanced technologies to transform …
has regularly come to the fore. Smart healthcare uses advanced technologies to transform …
Blind dual watermarking for color images' authentication and copyright protection
This paper presents a blind dual watermarking mechanism for digital color images in which
invisible robust watermarks are embedded for copyright protection and fragile watermarks …
invisible robust watermarks are embedded for copyright protection and fragile watermarks …
Hiding shares by multimedia image steganography for optimized counting-based secret sharing
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …
multi-user authentication systems. This work focus on improving the counting-based secret …
Review on spatial domain image steganography techniques
B Lakshmi Sirisha… - Journal of Discrete …, 2021 - Taylor & Francis
Steganography techniques leads main role in embedding process of secret information into
cover information in order to provide good security. These techniques are very essential …
cover information in order to provide good security. These techniques are very essential …
A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm
HR Kanan, B Nazeri - Expert systems with applications, 2014 - Elsevier
Steganography is knowledge and art of hiding secret data into information which is largely
used in information security systems. Various methods have been proposed in the literature …
used in information security systems. Various methods have been proposed in the literature …
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
JC Patra, JE Phua, C Bornand - Digital Signal Processing, 2010 - Elsevier
Digital watermarking techniques have been proposed for copyright protection and
authentication of multimedia data. In this paper, we propose a novel Chinese Remainder …
authentication of multimedia data. In this paper, we propose a novel Chinese Remainder …
SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images
The advances in computer technologies and the Internet have made rapid strides and
breakthroughs in the field of data communication, which nowadays, is easily accessed …
breakthroughs in the field of data communication, which nowadays, is easily accessed …
Reversible image secret sharing
X Yan, Y Lu, L Liu, X Song - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
In reversible image secret sharing (RISS), the cover image can be recovered to some
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …
A common method of share authentication in image secret sharing
Because of the importance of digital images and their extensive application to digital
watermarking, block chain, access control, identity authentication, distributive storage in the …
watermarking, block chain, access control, identity authentication, distributive storage in the …