Improved data hiding method for securing color images

MM Abdel-Aziz, KM Hosny, NA Lashin - Multimedia Tools and …, 2021 - Springer
Recently, data hiding techniques have become very popular in several vital applications,
especially in telemedicine. The reason for this is their ability to give good results such as …

User data privacy in multimedia domain using 3–3 LSB-based color image steganography with RC4 and Bernoulli map protection

VK Trivedi, S Stalin, S Joshi… - Journal of …, 2022 - spiedigitallibrary.org
Social media sites such as Facebook, Twitter, etc. have become commonplace in everyday
life. With the emergence of the internet, the amount of data being created and communicated …

A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique

OY Abdulhammed, PJ Karim, DR Arif, TS Ali… - Kurdistan Journal of …, 2022 - kjar.spu.edu.iq
The stegangraphic system supply premium secrecy and ability of conserving the mystery
information from gaining stalked or cracked. The suggested method consists of three phases …

[PDF][PDF] Subject review: information hiding using chaotic map

ZS Dhaief, R Mustafa, AA Maryoosh - Int J Adv Sci Res Eng, 2021 - academia.edu
It is vital to convert information into an unidentifiable form in order to protect your confidential
information from intruders. As a result, intruders will be unable to obtain your original …

[PDF][PDF] A multiple-chaotic approach for steganography

HH Alwan, ZM Hussain - J. Comput. Sci., 2019 - academia.edu
In a recent work, chaos has been utilized to modify addresses of message bits while hidden
in a cover image. In this study, we extend the above technique to include multiple chaotic …

On the Positioning of Moderately Significant Bit Data Hiding in High-Definition Images

DN Tran, HJ Zepernick, TMC Chu - 2018 12th International …, 2018 - ieeexplore.ieee.org
Mobile services have seen a shift from voice services toward visual stimuli-based services
ranging from mobile imaging over mobile gaming to upcoming mobile extended reality …

On moderately significant bit data hiding techniques for high-definition images

DN Tran, HJ Zepernick, TMC Chu - … Conference on Advanced …, 2018 - ieeexplore.ieee.org
In this paper, we study moderately significant bit data hiding techniques for high-definition
(HD) images. In contrast to least significant bit data hiding, we explore the potential of HD …

[PDF][PDF] A Multiplicative-Additive Chaotic-Address Steganography

H Alwan, Z Hussain - Journal of Kufa for Mathematics and Computer, 2020 - iasj.net
In this study, Multiple-Chaotic maps were merged by using multiplicative-additive form to
generate the chaotic sequences which are used to track the addresses of shuffled bits in …

[PDF][PDF] A REVIEW ON STEGANOGRAPHY AND ITS TECHNIQUES TO ENHANCE SECURITY

K Kaur - cgcijctr.com
Steganography is the art and science of esca** information under unremarkable cover. In
this paper the various techniques used to hide the message inside the images. The …

[NAVOD][C] Desarrollo de un método esteganográfico para la ocultación de información en medios

MPI Alfonso, PDM Parra, D Miguel