[PDF][PDF] Multi-stage protection using pixel selection technique for enhancing steganography

KIM Abuzanouneh, M Hadwan - International Journal of …, 2021 - researchgate.net
Steganography and data security are extremely important for all organizations. This
research introduces a novel stenographic method called multi-stage protection using the …

Steganography with pixel-value differencing and modulus function based on PSO

Z Li, Y He - Journal of information security and applications, 2018 - Elsevier
An effective steganographic scheme is proposed that combines pixel-value differencing,
modulus function, and particle swarm optimization on the basis of previous research. In this …

[PDF][PDF] A new steganography technique using snake scan ordering strategy

R Kumar, KK Saini, S Chand - International Journal of Image …, 2013 - mecs-press.org
In this paper, we propose a new steganography technique using the snake scan ordering
strategy. The proposed method hides the secret data that is an image in another image …

[PDF][PDF] A robust steganography model using wavelet-based block-partition modification

S Youssef, AA Elfarag, R Raouf - International Journal of …, 2011 - researchgate.net
An efficient steganographic method is proposed for embedding secret messages into gray
scale and RGB colored images. In this paper, a wavelet domain steganography is adopted …

An efficient steganographic framework based on dynamic blocking and genetic algorithm

M Iranpour, M Rahmati - Multimedia Tools and Applications, 2015 - Springer
An important property of any robust steganographic method is that it must introduce minimal
distortion in the created stego-images. This objective is achieved if one can maximize the …

[PDF][PDF] Image steganography method preserves the histogram shape of image

MAF Al-Husainy - European Journal of Scientific Research, 2015 - researchgate.net
Steganography gained the interest of researchers during the last few years as more
common method to hide confidential information. Image steganography got more …

Using contourlet transform and cover selection for secure steganography

H Sajedi, M Jamzad - International Journal of Information Security, 2010 - Springer
In this paper, we present a new adaptive contourlet-based steganography method that hides
secret data in a specific or automatically selected cover image. Our proposed …

[PDF][PDF] Message segmentation to enhance the security of LSB image steganography

MAF Al-Husainy - transit, 2012 - Citeseer
Classic Least Significant Bit (LSB) steganography technique is the most used technique to
hide secret information in the least significant bit of the pixels in the stego-image. This paper …

[PDF][PDF] Enhancing the least significant bit (LSB) algorithm for steganography

O Osunade, IA Ganiyu - International Journal of Computer …, 2016 - researchgate.net
Various Steganography algorithms have been proposed and implemented for hiding the
existence of data in a cover object starting from the algorithms that work in transform domain …

[PDF][PDF] Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability

VK Sharma, V Shrivastava - International Journal of Information and …, 2011 - Citeseer
Steganography is a branch of information hiding. It embeds the secret message in the cover
media (eg image, audio, video, etc.) to hide the existence of the message. In recent years …