Video steganography: a comprehensive review

MM Sadek, AS Khalifa, MGM Mostafa - Multimedia tools and applications, 2015 - Springer
Steganography is the art and science of secret communication, concealing the very
existence of a communication. Modern cover types can take many forms such as text …

Universal adversarial perturbations through the lens of deep steganography: Towards a fourier perspective

C Zhang, P Benz, A Karjauv, IS Kweon - Proceedings of the AAAI …, 2021 - ojs.aaai.org
The booming interest in adversarial attacks stems from a misalignment between human
vision and a deep neural network (DNN),\ie~ a human imperceptible perturbation fools the …

[PDF][PDF] Data security using cryptography and steganography techniques

ME Saleh, AA Aly, FA Omara - International Journal of …, 2016 - pdfs.semanticscholar.org
Although cryptography and steganography could be used to provide data security, each of
them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the …

[PDF][PDF] An improved image steganography method based on LSB technique with random pixel selection

MM Emam, AA Aly, FA Omara - International Journal of …, 2016 - pdfs.semanticscholar.org
with the rapid advance in digital network, information technology, digital libraries, and
particularly World Wide Web services, many kinds of information could be retrieved any time …

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

S Rahman, J Uddin, H Hussain, A Ahmed, AA Khan… - Scientific Reports, 2023 - nature.com
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …

[PDF][PDF] Hiding Information in Digital Images Using LSB Steganography Technique.

SA Jebur, AK Nawar, LE Kadhim… - International Journal of …, 2023 - researchgate.net
The highest way to protect data from intruder and unauthorized persons has become a
major issue. This matter led to the development of many techniques for data security, such …

Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data

AHM Almawgani, ARH Alhawari, AT Hindi… - … systems and signal …, 2022 - Springer
Digital images are commonly used in steganography due to the popularity of digital image
transfer and exchange through the Internet. However, the tradeoff between managing high …

Implementation and analysis of image steganography using Least Significant Bit and Discrete Wavelet Transform techniques

SS Yadahalli, S Rege… - 2020 5th international …, 2020 - ieeexplore.ieee.org
Steganography is classified among the foremost methods employed in data security to
conceal and safeguard confidential messages in the data transmitted. Security, especially …

Impact of various image formats supported by android smartphones on image steganography: a preliminary study

D Watni, S Chawla - Multimedia Tools and Applications, 2024 - Springer
Security of the information stored in android-based smartphones is a hot research topic.
Image steganography can be employed to increase the security of the confidential data …

Toward agent-based LSB image steganography system

FA Baothman, BS Edhah - Journal of Intelligent Systems, 2021 - degruyter.com
In a digital communication environment, information security is mandatory. Three essential
parameters used in the design process of a steganography algorithm are Payload, security …