A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

Spatial-Based 2D Image Steganography using Josephus-Traversing Concentric Midpoint Circle Algorithm

AA Malicsi, AM Sison - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
Steganography is the science of hiding secret messages within media like images and
further studies have been conducted to enhance existing techniques to secure …

[PDF][PDF] A comprehensive study of digital image steganographic techniques

H Hussain, AA Khan, A Ahmed… - IEEE Access https://doi …, 2023 - academia.edu
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

Security Model For Data On Transit In Mobile Banking Applications

DO Orucho - 2024 - repository.kisiiuniversity.ac.ke
Mobile banking applications is an advanced technology within mobile banking that exploits
the use of wireless and cellular networks to deliver banking services to users with increased …

Enhancing Data Security through Digital Image Steganography: An Implementation of the Two Least Significant Bits (2LSB) Method

FN Hakim, M Sholikhan - International Journal of Graphic …, 2024 - journal.stekom.ac.id
The rapid advancement of digital communication technologies has heightened the demand
for robust data security methods, particularly for safeguarding sensitive information against …

Qualitative and Quantitative Analysis of Modifications in Playfair Cipher

A Ray, K Singh, A Harsh, S Thorat, N Kar - International Conference on …, 2023 - Springer
Security in digital world has become a paramount issue, even more so in the post pandemic
world when the digital footprint of the world has increased. Multiple encryption techniques …

LSB based Image Steganography with Password-Protected SMTP Transmission

MB Prakash, ER Kumar, B Anitha… - 2024 Global …, 2024 - ieeexplore.ieee.org
Picture steganography plays a crucial role in secure communication by discreetly altering
images for various purposes such as data authentication, privacy protection, and …

Analysis and Optimization Strategies Based on 4-bit Absolute Value Detector

T Zhang - Proceedings of the 6th International Conference on …, 2023 - dl.acm.org
Currently, there is a strong emphasis on miniaturization and integration, allowing for smaller,
more portable devices with multi-functionality, abundant strategies could be used to improve …

[PDF][PDF] Keamanan Pesan Menggunakan Kriptografi dan Steganografi Least Significant Bit pada File Citra Digital

DE Wijayanti, W Romadlon - Euler: Jurnal Ilmiah Matematika …, 2022 - scholar.archive.org
Pada era saat ini sering terjadi gangguan keamanan data seperti pencurian data oleh orang
yang tidak diinginkan. Untuk mengatasi permasalahan keamanan dapat ditangani …