[LIVRE][B] Digital image watermarking: theoretical and computational advances

S Borra, R Thanki, N Dey - 2018 - api.taylorfrancis.com
The Book presents an overview of newly developed watermarking techniques in various
independent and hybrid domains Covers the basics of digital watermarking, its types …

[PDF][PDF] High-security image steganography technique using XNOR operation and fibonacci algorithm

AA Almayyahi, R Sulaiman, F Qamar… - International Journal of …, 2020 - researchgate.net
Since the number of internet users is increasing and sensitive information is exchanging
continuously, data security has become a problem. Image steganography is one of the ways …

Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system

K Sathish Shet, AR Aswath… - Multimedia Tools and …, 2017 - Springer
The most crucial task in real-time processing of steganography algorithms is to reduce the
computational delay and increase the throughput of a system. This critical issue is effectively …

An automated security approach of video steganography–based lsb using fpga implementation

S Abed, M Al-Mutairi, A Al-Watyan… - Journal of circuits …, 2019 - World Scientific
Steganography has become one of the most significant techniques to conceal secret data in
media files. This paper proposes a novel automated methodology of achieving two levels of …

[PDF][PDF] Dual cellular automata on FPGA: An image encryptors chip

R Amirtharajan - Research Journal of Information Technology, 2014 - researchgate.net
A ESTRA (" T Secure data transmission plays a crucial role in today's world. While the data
in the form of images are required extensively, the need to safeguard the original images …

Crypto‐Stego‐Real‐Time (CSRT) System for Secure Reversible Data Hiding

L Desai, S Mali - VLSI Design, 2018 - Wiley Online Library
Due to demand of information transfer through higher speed wireless communication
network, it is time to think about security of important information to be transferred. Further …

[PDF][PDF] Space filling curve for data filling: an embedded security approach

R Amirtharajan - Research Journal of Information Technology, 2014 - researchgate.net
A ESTRA (" T Embedded devices have taken a prominent role in today's data
communication. Steganography, an ancient method has immense budding to shield …

[PDF][PDF] Audio fingerprint indicator in embedded platform: A way for hardware steganography

R Amirtharajan - Journal of Artificial Intelligence, 2014 - researchgate.net
A ISTRA ("|"" l'he increased intimidation in pilfering copyrighted multimedia files demands
the imprint of ownership identity called fingerprint in videolaudio files. This would aid to …

Design and hardware implementation of a separable image steganographic scheme using public-key cryptosystem

S Harb, MO Ahmad, MN Swamy - arxiv preprint arxiv:2006.02775, 2020 - arxiv.org
In this paper, a novel and efficient hardware implementation of steganographic cryptosystem
based on a public-key cryptography is proposed. Digital images are utilized as carriers of …

[PDF][PDF] Comparative Analysis of (5/3) and Haar IVVT Based Steganography* V. Thanikaiselvan,'P. Arulmozhivarman," Siddhanta Chakrabarty," Ashutosh Agarwal,* S …

V Thanikaiselvan - Information Technology Journal, 2014 - researchgate.net
Steganography is the technique of hiding information inside other information. It provides
data security. Image steganography can be implemented in both, the spatial and transform …