An introduction to image steganography techniques

AAJ Altaay, SB Sahib, M Zamani - … international conference on …, 2012 - ieeexplore.ieee.org
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

A new data hiding method based on chaos embedded genetic algorithm for color image

Ş Doğan - Artificial Intelligence Review, 2016 - Springer
Data hiding algorithms, which have many methods describing in the literature, are widely
used in information security. In data hiding applications, optimization techniques are utilized …

PSW statistical LSB image steganalysis

S Shojae Chaeikar, M Zamani, AB Abdul Manaf… - Multimedia Tools and …, 2018 - Springer
Steganography is the art and science of producing covert communications by concealing
secret messages in apparently innocent media, while steganalysis is the art and science of …

Genetic algorithm for fragile audio watermarking

M Zamani, ABA Manaf - Telecommunication Systems, 2015 - Springer
A novel genetic-concept-based algorithm is proposed for fragile audio watermarking to
reduce the distortion of least significant bits substitution and consequently improve the peak …

[PDF][PDF] Correlation between PSNR and bit per sample rate in audio steganography

M Zamani, ABA Manaf, SM Abdullah… - … Conference on Signal …, 2012 - academia.edu
Steganography is a form of security technique through obscurity; the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer

R Tanwar, K Singh, M Zamani… - Journal of computer …, 2019 - Wiley Online Library
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …

Mazdak technique for PSNR estimation in audio steganography

Z Mazdak, BAM Azizah, MA Shahidan… - Applied Mechanics and …, 2012 - Trans Tech Publ
Mazdak Technique for PSNR Estimation in Audio Steganography Page 1 Mazdak Technique for
PSNR Estimation in Audio Steganography MAZDAK Zamania, AZIZAH Bt Abdul Manafb …

Lsb data hiding in digital media: a survey

DN Tran, HJ Zepernick, TMC Chu - EAI Endorsed Transactions on …, 2022 - diva-portal.org
Data hiding or information hiding is a prominent class of information security that aims at
reliably conveying secret data embedded in a cover object over a covert channel. Digital …

Comparison of data hiding techniques for video watermarking applications

F Arab, M Zamani, S Karamizadeh… - … on Computer and …, 2022 - ieeexplore.ieee.org
The basic idea for video watermarking technique is concealing information in the video host.
There are three popular techniques that can be used for data hiding those are …

Discrete wavelet transform domain techniques

F Arab, SM Daud, SZ Hashim - 2013 International conference …, 2013 - ieeexplore.ieee.org
Discrete Wavelet Transform Domain Techniques Page 1 Discrete Wavelet Transform Domain
Techniques 1 Farnaz Arab, 2 Salwani Mohd Daud, 3 Siti Zaiton Mohd Hashim 1, 2 Advanced …