[PDF][PDF] High capacity and security steganography using discrete wavelet transform

HSM Reddy, KB Raja - … Journal of Computer Science and Security …, 2009 - academia.edu
The secure data transmission over internet is achieved using Steganography. In this paper
High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is …

Robust and secured image-adaptive data hiding

SN Mali, PM Patil, RM Jalnekar - Digital Signal Processing, 2012 - Elsevier
Rapid growth in the demand and consumption of digital information in past decade has led
to valid concerns over issues such as content security, authenticity and digital right …

A hybrid secured approach combining LSB steganography and AES using mosaic images for ensuring data security

S Roy, MM Islam - SN Computer Science, 2022 - Springer
Steganography is a technique of hiding information in digital media such as images, text,
audio, etc. This digital media is used as the cover to make the private message invisible …

[PDF][PDF] An enhanced mechanism for image steganography using sequential colour cycle algorithm.

LY Por, DB Yin, TF Ang, SY Ong - Int. Arab J. Inf. Technol., 2013 - Citeseer
Several problems arise among the existing LSB-based image steganographic schemes due
to distortion in a stegoimage and limited payload capacity. Thus, a proposed scheme has …

[PDF][PDF] StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem

BB Zaidan, AA Zaidan, A Taqa, GM Alam, MLM Kiah… - Int. J. Phys …, 2010 - academia.edu
This paper discusses a secure novel approach of high rate data hidden using mosaic image
and bitmap (bmp) cryptosystem. The mosaic image used in this approach together with the …

Analysis of modified LSB approaches of hiding information in digital images

S Alam, SM Zakariya, MQ Rafiq - 2013 5th International …, 2013 - ieeexplore.ieee.org
Steganography is the idea of hiding private, confidential, sensitive data or information within
something that appears to be nothing out of the normal. In this paper we describe on how …

[PDF][PDF] A comprehensive image steganography tool using LSB scheme

SA El_Rahman - International Journal of Image, Graphics and …, 2015 - mecs-press.org
As a consequence of the fact, transmitting data has been fast and easy these days due to the
development of the Internet. Where internet is the most important medium for confidential …

[PDF][PDF] Frequency of occurrence analysis attack and its countermeasure.

LY Por - Int. Arab J. Inf. Technol., 2013 - iajit.org
This paper addresses a newly discovered security threat named Frequency of Occurrence
Analysis (FOA) attack in searchmetics password authentication scheme. A countermeasure …

A roadmap of steganography tools: conventional to modern

U Pilania, R Tanwar, P Gupta, T Choudhury - Spatial Information Research, 2021 - Springer
Steganography emerged as an effective technology for securing the data over the network.
Its specificity of concealing the existence of the secret data supports its application in …

Analysis of modified triple—A steganography technique using Fisher Yates algorithm

S Alam, SM Zakariya, N Akhtar - 2014 14th International …, 2014 - ieeexplore.ieee.org
Steganography is a science of embedding private, confidential, sensitive data or information
within the given cover media without making any visible changes to it. In this paper, we …