Automatic region selection method to enhance image-based steganography

SA Naji, HN Mohaisen, QS Alsaffar… - … of Engineering and …, 2020 - pen.ius.edu.ba
Image-based steganography is an essential procedure with several practical applications
related to information security, user authentication, copyright protection, etc. However, most …

Image steganography based on Kirsch edge detection

SK Ghosal, A Chatterjee, R Sarkar - Multimedia Systems, 2021 - Springer
Conventional steganography methods fabricate the secret information into the cover pixels
without analyzing the pixel intensities of an image. As a result, some minor pixel level …

An improved image steganography scheme with high visual image quality

S Laha, R Roy - 2015 International Conference on Computing …, 2015 - ieeexplore.ieee.org
With the advent of internet, secured transmission of data over networks offers a great
challenge. This problem of secrecy of information has drawn a lot of attention due to its …

Using contourlet transform and cover selection for secure steganography

H Sajedi, M Jamzad - International Journal of Information Security, 2010 - Springer
In this paper, we present a new adaptive contourlet-based steganography method that hides
secret data in a specific or automatically selected cover image. Our proposed …

Design of an edge detection based image steganography with high embedding capacity

AK Pal, T Pramanik - Quality, Reliability, Security and Robustness in …, 2013 - Springer
In this paper, the authors have proposed an image steganography method for improving the
embedding capacity of the gray-scale cover image. In general, the embedding of the secret …

Image steganography based on difference of Gaussians edge detection

B Patwari, U Nandi, SK Ghosal - Multimedia Tools and Applications, 2023 - Springer
This paper introduces an edge-based image Steganography scheme in which the pixels of
the cover images are categorized into two classes: edge and non-edge. In general, the edge …

[PDF][PDF] Image steganography using least significant bit and secret map techniques.

A ALabaichi, MAAK Al-Dabbas… - International journal of …, 2020 - researchgate.net
In steganography, secret data are invisible in cover media, such as text, audio, video and
image. Hence, attackers have no knowledge of the original message contained in the media …

[PDF][PDF] An efficient neural network based algorithm of steganography for image

I Khan - International Journal of Computer Technology and …, 2014 - researchgate.net
To provide large capacity of the hidden secret data and to maintain a good visual quality of
stego-image a novel steganographic method based on neural network and random …

An efficient image steganography method using multiobjective differential evolution

M Kaur, V Kumar, D Singh - Digital Media Steganography, 2020 - Elsevier
Abstract Information hiding is very important during the transmission, so that it cannot be
disclosed to unauthenticated persons. Steganography is one of the famous methods to hide …

8-Rooks Solutions for Image Steganography Technique.

MK Bhatia - International Journal of Next-Generation …, 2017 - search.ebscohost.com
Exchange of secret messages on the internet is a big issue for the researchers. This raises
the need of an information hiding technique, Steganography is an art of hiding digital …