A secure image steganography algorithm based on least significant bit and integer wavelet transform

E Emad, A Safey, A Refaat, Z Osama… - Journal of Systems …, 2018 - ieeexplore.ieee.org
The rapid development of data communication in modern era demands secure exchange of
information. Steganography is an established method for hiding secret data from an …

A new method of coding for steganography based on LSB matching revisited

M Fateh, M Rezvani, Y Irani - Security and communication …, 2021 - Wiley Online Library
LSB matching revisited is an LSB‐based approach for image steganography. This method is
a type of coding to increase the capacity of steganography. In this method, two bits of the …

Steganography literature survey, classification and comparative study

A Fkirin, G Attiya, A El-Sayed - Communications on Applied …, 2016 - caeaccess.org
Transmitting confidential images between two channels suffer from hacking. Therefore,
protecting confidentiality has become a very essential issue. Recently, several methods are …

A multiple-format steganography algorithm for color images

AS Ansari, MS Mohammadi, MT Parvez - IEEE Access, 2020 - ieeexplore.ieee.org
This paper presents an image Steganography algorithm that can work for cover images of
multiple formats. Having a single algorithm for multiple image types provides several …

VidaGAN: Adaptive GAN for image steganography

VY Ramandi, M Fateh, M Rezvani - IET Image Processing, 2024 - Wiley Online Library
A recent approach to image steganography is to use deep learning. Mainly, convolutional
neural networks can extract complex features and use them as patterns to combine hidden …

[PDF][PDF] Bit inverting map method for improved steganography scheme

AM Fadhil - Diss. Universiti Teknologi Malaysia, 2016 - core.ac.uk
Achieving an efficient and accurate steganography scheme for hiding information is the
foremost priority in the information and communication technology era. The developed …

[PDF][PDF] A comprehensive review on medical image steganography based on lsb technique and potential challenges

BA Shtayt, NH Zakaria, NH Harun - Baghdad Science Journal, 2021 - iasj.net
The rapid development of telemedicine services and the requirements for exchanging
medical information between physicians, consultants, and health institutions have made the …

A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis

A Agarwal, S Malik - 2022 IEEE 7th International conference for …, 2022 - ieeexplore.ieee.org
Owing to cyberattacks risks as well as other accidental alterations while active
communication across an unsecured network, establishing a secure connection betwixt two …

Enhanced algorithms for steganography based on least significant bit and secret image compression

M Khaled, AHA El-Atta - 2021 Tenth International Conference …, 2021 - ieeexplore.ieee.org
the data can be secured using various methods, such as cryptography, watermarking, and
steganography. For secure communication, an image is utilized as the cover in image …

[PDF][PDF] Halftone Pattern: A New Steganographic Approach.

L Cruz, B Patrão, N Gonçalves, O Diamanti… - Eurographics (Short …, 2018 - diglib.eg.org
In general, an image is worth a thousand words, but sometimes, words are the most efficient
tool to communicate some information. Thereupon, in this work, we will present an approach …