[PDF][PDF] Review of the Literature on the Steganography Concept

F Şahin, T Çevik, M Takaoğlu - International Journal of Computer …, 2021 - researchgate.net
Information hiding is a subject of study from past to present. Information hiding processes,
called steganography, have been the focus of interest since the beginning of history …

[PDF][PDF] Image Steganography: Classification, Application and Algorithms

S Mohan, S Singh - International Journal of Core Engineering & …, 2015 - Citeseer
Steganography is the technique/science of hiding information inside some innocent looking
canvas like images. The growth of internet and communication technology has enabled the …

[PDF][PDF] A survey on image steganography and its techniques in spatial and frequency domain

KD Nagpal, PDS Dabhade - … Journal on recent and innovation trends …, 2015 - academia.edu
Steganography is an intelligent art of communicating in a way which hides the endurance of
the communication. The image steganography technique takes the asset of confined power …

[PDF][PDF] Steganography in images using LSB technique

AK Singh, J Singh, HV Singh - … of Latest Trends in Engineering and …, 2015 - researchgate.net
This paper, a novel data-hiding technique based on the LSB technique of digital images is
presented. Data hiding is one of best topic in secret communication. A lossless data hiding …

[PDF][PDF] Review on binary image steganography and watermarking

GJ Chhajed, KV Deshmukh, TS Kulkarni - International Journal on …, 2011 - Citeseer
In this paper we have reviewed and analyzed different watermarking and steganography
techniques. This is based on image processing in spatial and transform domain. We have …

[PDF][PDF] Variable rate steganography in digital images using two, three and four neighbor pixels

A Pradhan, DS Sharma, G Swain - Indian Journal of Computer Science …, 2012 - Citeseer
In this paper three image steganography methods with variable rate of embedding are
proposed. In the first method, called two neighbor method the two neighboring pixels such …

A new combinational technique in image steganography

S Pramanik, D Samanta… - International Journal of …, 2021 - igi-global.com
Internet is used for exchanging information. Sometimes it is needed to transmit confidential
data via internet. Here the authors use image steganography to pass confidential data within …

[PDF][PDF] A Hash Based Approach for secure image stegnograpgy using canny edge detection method

K Singla, S Kaur - Int. J. Comput. Sci. Commun, 2012 - csjournals.com
In this paper, hash based approach for secure steganography using edge detection is
presented. Besides employing the hash based approach as a fundamental stage, we take …

[PDF][PDF] Image steganography using modified least significant bit

AM Odat, MA Otair - Indian Journal of Science and Technology, 2016 - researchgate.net
Abstract Background/Objective: Manipulation of sensitive images is a very important issue in
modern transmission and storage. The objective of this study is to achieve the protection by …

[HTML][HTML] A secure image steganography using advanced encryption standard and discrete cosine transform

A Tauhid, M Tasnim, SA Noor, N Faruqui… - Journal of Information …, 2019 - scirp.org
Cryptography and Steganography are two prominent techniques to obtain secure
communication over the shared media like the Internet. Steganography is slightly ahead of …