-
1
-
2
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01“…Finally, our research provides more security because of the mixture between cryptography and steganography. …”
Get full text
Article -
3
Image vaccine against steganography in encrypted domain
Published 2025-02-01Subjects: Get full text
Article -
4
On Max-Plus Algebra and Its Application on Image Steganography
Published 2018-01-01“…We propose a new steganography method to hide an image into another image using matrix multiplication operations on max-plus algebra. …”
Get full text
Article -
5
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“…Since its inception in the 1990s till the present, digital steganography has a lengthy history. Early steganography focused primarily on imperceptibility, security and embedding capacity. …”
Get full text
Article -
6
-
7
A Formula Adaptive Pixel Pair Matching Steganography Algorithm
Published 2018-01-01“…Pixel pair matching (PPM) is widely used in digital image steganography. As an important derivation, adaptive pixel pair matching method (APPM) offers low distortion and allows embedded digits in any notational system. …”
Get full text
Article -
8
A New Information Hiding Method Based on Improved BPCS Steganography
Published 2015-01-01Get full text
Article -
9
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Published 2015-01-01“…Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. …”
Get full text
Article -
10
A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video
Published 2016-01-01“…This exemplifies that steganography is affordable in digital television.…”
Get full text
Article -
11
A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography
Published 2021-01-01“…The result of this implementation shows that the modified LSB image steganography outperformed the standard LSB technique with a higher PSNR value and lower MSE value when compared with previous research works. …”
Get full text
Article -
12
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
Published 2022-10-01Subjects: “…steganography…”
Get full text
Article -
13
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01Subjects: “…Steganography…”
Get full text
Article -
14
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article -
15
AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm
Published 2021-07-01“…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
Get full text
Article -
16
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer
Published 2019-01-01“…Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. …”
Get full text
Article -
17
A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image
Published 2018-01-01“…This proposed image steganography showed interesting, promising results when compared with other existing techniques.…”
Get full text
Article -
18
A Three-Dimensional Autonomous System with a Parabolic Equilibrium: Dynamical Analysis, Adaptive Synchronization via Relay Coupling, and Applications to Steganography and Chaos Encryption
Published 2022-01-01“…Performance analysis of an adaptive synchronization via relay coupling and a hybrid steganography chaos encryption application are provided. …”
Get full text
Article -
19
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01Subjects: Get full text
Article -
20
A STEGENOGRAPHY IN 3D MESH BY REARRANGING THE ORDER OF VERTEX PRESENTATION
Published 2013-06-01Subjects: Get full text
Article