Compressive Embedding Method for Reversible Steganography Using XOR Approach

S Rathor, S Srivastava, A Raj, A Singh… - … Conference on Multi …, 2024 - Springer
… the combination of confidential information and masking images. … discrete cosine mathematical
transformations such as DCT) … used the XOR operation which helps us better analyze our …

Combined cryptography and steganography for enhanced security in suboptimal images

SJ Gladwin, PL Gowthami - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
… and DCT coefficients of an image, embedded into the base … Discrete Cosine Transform
(IDCT) to these obtained DCT coefficients. From the XOR values between the original image and …

Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique

M Kumar, A Soni, ARS Shekhawat… - … conference on artificial …, 2022 - ieeexplore.ieee.org
… For security of the digital data combination of steganography and cryptography is used […
Enhanced Text and Image Security Using Combination of DCT Steganography, XOR Embedding

Securing and hiding secret message in image using xor transposition encryption and LSB method

A Setyono - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
steganography techniques and transposition XOR encryption techniques with the aim of
increasing the security of embedded … that OTP is better in terms of security and computational …

Dynamic 8-bit XOR algorithm with AES crypto algorithm for image steganography

D Madhu, S Vasuhi, A Samydurai - Signal, Image and Video Processing, 2024 - Springer
… for embedding patient records in medical JPEG images. The … identifying adjacent discrete
cosine transform (DCT) blocks of … -bit XOR algorithm with the AES crypto algorithm to enhance

[HTML][HTML] A secure image steganography using advanced encryption standard and discrete cosine transform

A Tauhid, M Tasnim, SA Noor, N Faruqui… - … of Information Security, 2019 - scirp.org
… of security has been introduced by applying XOR operation … To embed by using LSB
replacement method, we replace an … there is better invisibility of our data in the cover image. This …

Data Security with combination of Cryptography and Audio Steganography

K Kapoor - 2019 - norma.ncirl.ie
… techniques for getting the embedding area for better … on the combination of the DWT-DCT
to provide better robustness … payload with XOR encryption before using steganography. The …

Improved data hiding method for securing color images

MM Abdel-Aziz, KM Hosny, NA Lashin - Multimedia Tools and …, 2021 - Springer
… quantized block of DCT using (8-bit LMSB) strategy for embedding process. … -M3 to achieve
high resistance to steganalysis; they … The data hider side encrypts the input image using XOR

Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
… The foremost objective of the work is to enhance the new … the matrix XOR coding
steganography approach. Moreover, in … text and DCT transformation is applied to the image

Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
… , security, imperceptibility and higher bit embedding rate. This … With the combination of both,
it provides an additional layer … 3D image steganography is complex in nature but have better