Double-layer image security scheme with aggregated mathematical sequences

MT Elkandoz, W Alexan… - … conference on advanced …, 2019 - ieeexplore.ieee.org
Information security has been a major concern since the evolution of technology. Nowadays,
internet users' are increasing and their information is being shared almost every second …

Applications of data hiding techniques in medical and healthcare systems: a survey

H Sajedi - Network Modeling Analysis in Health Informatics and …, 2018 - Springer
Nowadays, scientists make effort to provide security for the communication channels.
Several security and privacy threats are introduced via the Internet as the major …

A review on image steganographic techniques based on optimization algorithms for secret communication

V Gnanalakshmi, G Indumathi - Multimedia Tools and …, 2023 - search.proquest.com
This review paper explores the use of optimization techniques in steganography, the art of
hiding secret information within other data. Steganography is a field that has gained …

Performance enhanced image steganography systems using transforms and optimization techniques

S Uma Maheswari, D Jude Hemanth - Multimedia Tools and Applications, 2017 - Springer
Image steganography is the art of hiding highly sensitive information onto the cover image.
An ideal approach to image steganography must satisfy two factors: high quality of stego …

Stega4NeRF: cover selection steganography for neural radiance fields

W Dong, J Liu, L Chen, W Sun… - Journal of Electronic …, 2024 - spiedigitallibrary.org
The implicit neural representation of visual data (such as images, videos, and 3D models)
has become a current hotspot in computer vision research. This work proposes a cover …

Information-theoretic bounds for steganography in visual multimedia

HY El-Arsh, A Abdelaziz, A Elliethy, HA Aly… - Journal of Information …, 2025 - Elsevier
Steganography in visual multimedia embeds data into an image or video cover object and
produces a corresponding stego object with some distortion. Establishing an upper bound …

Efficient cover image selection based on spatial block analysis and DCT embedding

S Abed, SA Al-Roomi, M Al-Shayeji - EURASIP Journal on Image and …, 2019 - Springer
In steganography, the cover medium is widely treated as a mere container for the embedded
information, even though it affects the stego-image quality, security, and robustness. In …

Image steganalysis using artificial bee colony algorithm

H Sajedi - Journal of ExpErimEntal & thEorEtical artificial …, 2017 - Taylor & Francis
Steganography is the science of secure communication where the presence of the
communication cannot be detected while steganalysis is the art of discovering the existence …

Transmitting hidden information using steganography via Facebook

ND Amsden, L Chen, X Yuan - Fifth International Conference …, 2014 - ieeexplore.ieee.org
Social networking websites, specifically Facebook, offer means of reaching wide audiences
to share information, including photos, documents, and videos. Social networks post …

[PDF][PDF] Image Steganography using Hybrid Edge Detector and Ridgelet Transform.

SU Maheswari, DJ Hemanth - Defence Science Journal, 2015 - researchgate.net
Steganography is the art of hiding high sensitive information in digital image, text, video, and
audio. In this paper, authors have proposed a frequency domain steganography method …