T Pandikumar, T Gebreslassie - Int. Res. J. Eng. Technol, 2016 - researchgate.net
Over past few decades, with the advancement of communication technology the use of internet has grown extremely to exchange information without any distance barrier …
S Tyagi, RK Dwivedi, AK Saxena - Int. J. Innov. Technol. Exploring …, 2019 - academia.edu
This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple …
S Thepade, S Chavan - International Journal of Engineering …, 2013 - academia.edu
This paper presents a review of multifarious methods available for image steganography. The steganography is an art and science of invisible communication. The image …
Steganography and data security are extremely important for all organizations. This research introduces a novel stenographic method called multi-stage protection using the …
EHJ Halboos, AM Albakry - Bulletin of Electrical Engineering and …, 2022 - beei.org
One of the highest priorities in the era of information technology is to achieve an accurate and effective system for hiding security data. One of the goals of steganography is …
G Paul, SK Saha, D Burman - Multimedia Tools and Applications, 2020 - Springer
Modern research in Steganography focuses on increasing the capacity without keeping any perceptible signature into the stego-media. In this work, we present a pixel value difference …
S Goel, S Gupta, N Kaushik - … of the 3rd International Conference on …, 2015 - Springer
In this paper we have proposed a new technique of hiding a message on least significant bit of a cover image using different progressions. We have also compared the cover image and …
Steganography is the art of hiding user information in various file types including image, audio and video. Security of steganography lies in imperceptibility of secret information in …
A Asok, P Mohan - … 3rd International Conference on Trends in …, 2019 - ieeexplore.ieee.org
The daily use of internet for data transmission is increasing dramatically, day by day. So the security of the data being transferred have also become imperative. There are variety of …