A secure image steganography algorithm based on least significant bit and integer wavelet transform
E Emad, A Safey, A Refaat, Z Osama… - Journal of Systems …, 2018 - ieeexplore.ieee.org
The rapid development of data communication in modern era demands secure exchange of
information. Steganography is an established method for hiding secret data from an …
information. Steganography is an established method for hiding secret data from an …
A new method of coding for steganography based on LSB matching revisited
LSB matching revisited is an LSB‐based approach for image steganography. This method is
a type of coding to increase the capacity of steganography. In this method, two bits of the …
a type of coding to increase the capacity of steganography. In this method, two bits of the …
Steganography literature survey, classification and comparative study
Transmitting confidential images between two channels suffer from hacking. Therefore,
protecting confidentiality has become a very essential issue. Recently, several methods are …
protecting confidentiality has become a very essential issue. Recently, several methods are …
A multiple-format steganography algorithm for color images
This paper presents an image Steganography algorithm that can work for cover images of
multiple formats. Having a single algorithm for multiple image types provides several …
multiple formats. Having a single algorithm for multiple image types provides several …
VidaGAN: Adaptive GAN for image steganography
A recent approach to image steganography is to use deep learning. Mainly, convolutional
neural networks can extract complex features and use them as patterns to combine hidden …
neural networks can extract complex features and use them as patterns to combine hidden …
[PDF][PDF] Bit inverting map method for improved steganography scheme
AM Fadhil - Diss. Universiti Teknologi Malaysia, 2016 - core.ac.uk
Achieving an efficient and accurate steganography scheme for hiding information is the
foremost priority in the information and communication technology era. The developed …
foremost priority in the information and communication technology era. The developed …
[PDF][PDF] A comprehensive review on medical image steganography based on lsb technique and potential challenges
The rapid development of telemedicine services and the requirements for exchanging
medical information between physicians, consultants, and health institutions have made the …
medical information between physicians, consultants, and health institutions have made the …
A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis
A Agarwal, S Malik - 2022 IEEE 7th International conference for …, 2022 - ieeexplore.ieee.org
Owing to cyberattacks risks as well as other accidental alterations while active
communication across an unsecured network, establishing a secure connection betwixt two …
communication across an unsecured network, establishing a secure connection betwixt two …
Enhanced algorithms for steganography based on least significant bit and secret image compression
M Khaled, AHA El-Atta - 2021 Tenth International Conference …, 2021 - ieeexplore.ieee.org
the data can be secured using various methods, such as cryptography, watermarking, and
steganography. For secure communication, an image is utilized as the cover in image …
steganography. For secure communication, an image is utilized as the cover in image …
[PDF][PDF] Halftone Pattern: A New Steganographic Approach.
In general, an image is worth a thousand words, but sometimes, words are the most efficient
tool to communicate some information. Thereupon, in this work, we will present an approach …
tool to communicate some information. Thereupon, in this work, we will present an approach …