Methodologies in Steganography and Cryptography–Review

GK Murhty, T Kanimozhi - Modern Approaches in Machine Learning and …, 2024 - Springer
Today we are living in a digital world. The transfer of data via an unsafe channel is
becoming a crucial subject. And simultaneously cybercriminals are growing across the …

Comprising Survey of Steganography & Cryptography: Evaluations, Techniques and Trends in Future Research

M Bansal, R Ratan - 2022 8th International Conference on …, 2022 - ieeexplore.ieee.org
At the moment, multimedia data protection has become a critical activity. It is primarily
utilized when information confidentiality is vital, which can be accomplished through …

[PDF][PDF] Data Hiding Techniques Using Steganography Algorithms

A Tyagi, RV Singh, S Sharma - ResearchGate, Feb, 2020 - researchgate.net
Steganography is the method of hiding information or data in a very peculiar manner using
cover objects and various techniques. In the last two decades the adaptability of the digital …

Implementation of cryptography in steganography for enhanced security

H Antonio, PWC Prasad, A Alsadoon - Multimedia Tools and Applications, 2019 - Springer
The rapid development in technology has had a great influence on the exchange of
information. In this modern era, maintaining security during informationexchanges is …

Cryptography and Steganography: teaching experience

B Sokół, VN Yarmolik - Enhanced methods in computer security, biometric …, 2005 - Springer
In this article we present overview of work with cryptography and steganography techniques,
which refers to information hiding and providing secrecy. Article contains cryptography and …

Machine learning and deep learning in steganography and steganalysis

A Gupta, S Pramanik, HT Bui… - … Approach to Modern …, 2021 - igi-global.com
Steganography is the way to conceal data inside a normal (non-mystery) record to keep it
from discovery. While encryption expects to conceal the substance of data, steganography …

[PDF][PDF] Cryptographic steganography

V Yadav, V Ingale, A Sapkal, G Patil - Computer Science & Information …, 2014 - csitcp.com
In the cryptographic steganography system, the message will first be converted into
unreadable cipher and then this cipher will be embedded into an image file. Hence this type …

A survey of data mining techniques for steganalysis

FG Mohammadi, MS Abadeh - Recent advances in …, 2012 - books.google.com
The skill of observing the invisible embedded messages in images, audio, video, text as
multimedia and protocols called Steganalysis. An efficient steganalysis method should …

[PDF][PDF] Steganography & the art of deception: a comprehensive survey

Y Bassil - Int. Journal on Latest Trends Computing, 2013 - lacsc.org
Ever since the beginning of human civilization, mankind had always confidential things to
hide or share secretly. Endless methods were devised; an ingenious one is called …

[PDF][PDF] An overview of steganography through history

N Alabdali, S Alzahrani - Int J Sci Eng Sci, Kingd Saudi Arab, 2021 - ijses.com
Steganography is the science of hiding information. The information can take any form and
type including images, audio files, and texts. The practice of hiding information is not new …