A new method of coding for steganography based on LSB matching revisited

M Fateh, M Rezvani, Y Irani - Security and communication …, 2021 - Wiley Online Library
LSB matching revisited is an LSB‐based approach for image steganography. This method is
a type of coding to increase the capacity of steganography. In this method, two bits of the …

A new high capacity and secure image realization steganography based on ASCII code matching

HT Elshoush, MM Mahmoud, A Altigani - Multimedia Tools and …, 2022 - Springer
Digital Steganography is the art of hiding secret messages behind an innocent looking
digital media that do not raise suspicions. In this paper, a new proposed image realization …

Image steganography and steganalysis based on least significant bit (LSB)

O Rachael, S Misra, R Ahuja, A Adewumi… - Proceedings of ICETIT …, 2020 - Springer
The sending of encrypted messages attracts the attention of programmers and crackers who
would seek to intercept and uncover the messages before arrive their intended destination …

A novel image steganographic approach for hiding text in color images using HSI color model

K Muhammad, J Ahmad, H Farman… - ar**
R Roy, S Changder - 2014 seventh international conference on …, 2014 - ieeexplore.ieee.org
Image Realization Steganography aims in devising techniques that realize a secret
message from a cover image using a suitable cover-to-secret map** with low embedding …

A dynamic programming approach to secure user image data in cloud based ERP systems

S Mandal, DA Khan - 2019 fifth international conference on …, 2019 - ieeexplore.ieee.org
Cloud based ERP systems are now used worldwide for better organizational control and
management. Centralized access structure, high degree of availability and low platform …

An Innovative Model for Secure Environment Using Steganography

KG Maheswari, C Siva… - 2022 8th International …, 2022 - ieeexplore.ieee.org
Steganography is a form of safety approach through obscurity, and it's the art of hiding the
message among sender and the intended recipient. it is used to cover secret messages in …