[PDF][PDF] A review on LSB substitution and PVD based image steganography techniques

AK Sahu, G Swain - Indonesian Journal of Electrical Engineering and …, 2016 - core.ac.uk
There has been a tremendous growth in Information and Communication technologies
during the last decade. Internet has become the dominant media for data communication …

[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …

Performance evaluation parameters of image steganography techniques

A Pradhan, AK Sahu, G Swain… - … conference on research …, 2016 - ieeexplore.ieee.org
This paper illustrates the various performance evaluation parameters of image
steganography techniques. The performance of a steganographic technique can be rated by …

A steganographic method combining LSB substitution and PVD in a block

G Swain - Procedia Computer Science, 2016 - Elsevier
In the recent past some steganography techniques by combining least significant bit (LSB)
substitution and pixel value differencing (PVD) have been proposed to improve upon the …

Adaptive pixel value differencing steganography using both vertical and horizontal edges

G Swain - Multimedia Tools and Applications, 2016 - Springer
This paper proposes two pixel value differencing (PVD) steganography techniques by
considering adaptive ranges to improve the security. In the first technique, the image is …

Review on techniques and file formats of image compression

AJ Qasim, R Din, FQA Alyousuf - Bulletin of Electrical Engineering and …, 2020 - beei.org
This paper presents a review of the compression technique in digital image processing. As
well as a brief description of the main technologies and traditional format that commonly …

A comprehensive survey on stegomalware detection in digital media, research challenges and future directions

LT Badar, B Carminati, E Ferrari - Signal Processing, 2025 - Elsevier
Stegomalware is a malicious activity that employs steganography techniques to hide
malicious code within innocent-looking files. The hidden code can then be executed to …

Digital image steganography using LSB substitution, PVD, and EMD

A Pradhan, KR Sekhar, G Swain - Mathematical Problems in …, 2018 - Wiley Online Library
To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image
steganography techniques by appropriate combination of LSB substitution, pixel value …

[PDF][PDF] Digital image steganography using nine-pixel differencing and modified LSB substitution

G Swain - Indian Journal of Science and …, 2014 - sciresol.s3.us-east-2.amazonaws …
To provide higher embedding capacity without sacrificing the imperceptibility, a novel
steganographic technique based on nine-pixel differencing with modified Least Significant …

[PDF][PDF] An improved data hiding technique using bit differencing and LSB matching

AK Sahu, G Swain - Internetworking Indonesia Journal, 2018 - researchgate.net
This paper proposes an improved image steganographic technique based on the principle
of modified least significant bit (LSB) substitution and LSB matching, to improve the capacity …