Showing 1 - 20 results of 34 for search '"steganography"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Multistage Encryption for Text Using Steganography and Cryptography by Mohammed Majid Msallam, Fayez Aldoghan

    Published 2023-03-01
    “…Finally, our research provides more security because of the mixture between cryptography and steganography. …”
    Get full text
    Article
  3. 3
  4. 4

    On Max-Plus Algebra and Its Application on Image Steganography by Kiswara Agung Santoso, Fatmawati, Herry Suprajitno

    Published 2018-01-01
    “…We propose a new steganography method to hide an image into another image using matrix multiplication operations on max-plus algebra. …”
    Get full text
    Article
  5. 5

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “…Since its inception in the 1990s till the present, digital steganography has a lengthy history. Early steganography focused primarily on imperceptibility, security and embedding capacity. …”
    Get full text
    Article
  6. 6
  7. 7

    A Formula Adaptive Pixel Pair Matching Steganography Algorithm by Min Long, Fenfang Li

    Published 2018-01-01
    “…Pixel pair matching (PPM) is widely used in digital image steganography. As an important derivation, adaptive pixel pair matching method (APPM) offers low distortion and allows embedded digits in any notational system. …”
    Get full text
    Article
  8. 8
  9. 9

    Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication by Jung-oh Park, Sanggeun Kim

    Published 2015-01-01
    “…Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. …”
    Get full text
    Article
  10. 10

    A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video by Christian Di Laura, Diego Pajuelo, Guillermo Kemper

    Published 2016-01-01
    “…This exemplifies that steganography is affordable in digital television.…”
    Get full text
    Article
  11. 11

    A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography by Roseline Oluwaseun Ogundokun, Oluwakemi Christiana Abikoye

    Published 2021-01-01
    “…The result of this implementation shows that the modified LSB image steganography outperformed the standard LSB technique with a higher PSNR value and lower MSE value when compared with previous research works. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm by Neetika Soni, Indu Saini, Butta Singh

    Published 2021-07-01
    “…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
    Get full text
    Article
  16. 16

    An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer by Rohit Tanwar, Kulvinder Singh, Mazdak Zamani, Amit Verma, Prashant Kumar

    Published 2019-01-01
    “…Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. …”
    Get full text
    Article
  17. 17

    A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image by Kamaldeep Joshi, Swati Gill, Rajkumar Yadav

    Published 2018-01-01
    “…This proposed image steganography showed interesting, promising results when compared with other existing techniques.…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20