Video steganography: a comprehensive review
Steganography is the art and science of secret communication, concealing the very
existence of a communication. Modern cover types can take many forms such as text …
existence of a communication. Modern cover types can take many forms such as text …
Universal adversarial perturbations through the lens of deep steganography: Towards a fourier perspective
The booming interest in adversarial attacks stems from a misalignment between human
vision and a deep neural network (DNN),\ie~ a human imperceptible perturbation fools the …
vision and a deep neural network (DNN),\ie~ a human imperceptible perturbation fools the …
[PDF][PDF] Data security using cryptography and steganography techniques
Although cryptography and steganography could be used to provide data security, each of
them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the …
them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the …
[PDF][PDF] An improved image steganography method based on LSB technique with random pixel selection
MM Emam, AA Aly, FA Omara - International Journal of …, 2016 - pdfs.semanticscholar.org
with the rapid advance in digital network, information technology, digital libraries, and
particularly World Wide Web services, many kinds of information could be retrieved any time …
particularly World Wide Web services, many kinds of information could be retrieved any time …
A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …
organizations such as government offices, military, private companies, etc. use different …
[PDF][PDF] Hiding Information in Digital Images Using LSB Steganography Technique.
The highest way to protect data from intruder and unauthorized persons has become a
major issue. This matter led to the development of many techniques for data security, such …
major issue. This matter led to the development of many techniques for data security, such …
Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data
Digital images are commonly used in steganography due to the popularity of digital image
transfer and exchange through the Internet. However, the tradeoff between managing high …
transfer and exchange through the Internet. However, the tradeoff between managing high …
Implementation and analysis of image steganography using Least Significant Bit and Discrete Wavelet Transform techniques
SS Yadahalli, S Rege… - 2020 5th international …, 2020 - ieeexplore.ieee.org
Steganography is classified among the foremost methods employed in data security to
conceal and safeguard confidential messages in the data transmitted. Security, especially …
conceal and safeguard confidential messages in the data transmitted. Security, especially …
Impact of various image formats supported by android smartphones on image steganography: a preliminary study
D Watni, S Chawla - Multimedia Tools and Applications, 2024 - Springer
Security of the information stored in android-based smartphones is a hot research topic.
Image steganography can be employed to increase the security of the confidential data …
Image steganography can be employed to increase the security of the confidential data …
Toward agent-based LSB image steganography system
FA Baothman, BS Edhah - Journal of Intelligent Systems, 2021 - degruyter.com
In a digital communication environment, information security is mandatory. Three essential
parameters used in the design process of a steganography algorithm are Payload, security …
parameters used in the design process of a steganography algorithm are Payload, security …