Comparative Study of Image Encryption and Image Steganography Using Cryptographic Algorithms and Image Evaluation Metrics

ST Chavali, CT Kandavalli, TM Sugash… - … : Select Proceedings of …, 2023 - Springer
… In this paper, Steganography is carried out by converting the message hidden into ciphertext
using renowned cryptographic algorithms like Advanced Encryption Standard (AES) and …

[HTML][HTML] Systematic literature review and analysis for Arabic text steganography method practically

NA Roslan, NI Udzir, R Mahmod, A Gutub - Egyptian Informatics Journal, 2022 - Elsevier
… rapidly growing studies on Arabic text steganography (ATS) … among the existing review
articles linked to this research area. As … literature review (SLR) on the techniques and algorithms

A comparative analysis of audio steganography methods and tools

PM Reyers - 2023 - essay.utwente.nl
… speaking about such an algorithms. The comparative analysis and the datasets/evaluation
features … has the most realistic character distribution since it is real English text, the rest of the …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
… By using language-based, the robustness of the text steganography algorithm will be …
the quality and the security of text steganography algorithms, the increment in the capacity …

A comparative study of various lossless compression techniques of steganography and cryptography

V Kumar, G Singh, B Singh - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
… the security of combination of steganography and cryptography by using ECC algorithm.
This algorithm is used here to produce public and private key for encryption of plain text. Also, a …

A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information

SA El_Rahman - Computers & Electrical Engineering, 2018 - Elsevier
Steganography is the practice of concealing the communication existence by hiding the …
This paper aims to study Discrete Cosine Transform (DCT) based steganography Using DC …

Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
… In this study, an effective security structure was presented … text steganography for concealing
categorized Arabic text … (bit mask-oriented genetic algorithm) to decrease the repetition …

Comparative analysis of halftoning algorithms for digital watermarking

A Makarov, E Yakovleva - 2016 18th Conference of Open …, 2016 - ieeexplore.ieee.org
… secret key, which provides theoretical and practical secrecy of the stegosystem, and detection,
… other half toning algorithms. Thus, the proposed steganographic system provides desired …

AITSteg: An innovative text steganography technique for hidden transmission of text message via social media

MT Ahvanooey, Q Li, J Hou, HD Mazraeh… - IEEE Access, 2018 - ieeexplore.ieee.org
… technique and conduct practical experiments to evaluate it … and related works on text
steganography. Section III presents … researchers design a text steganography algorithm. However, …

[PDF][PDF] New robust and secure alphabet pairing text steganography algorithm

SS Iyer, K Lakhtaria - … Current Trends in Engineering & Research …, 2016 - researchgate.net
… have been proposed in the area of Linguistic Steganography. The comparative study of
some of the papers is presented here in summary form. This comparative study has been …