A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique

V Kalaichelvi, P Meenakshi, P Vimala Devi… - Journal of Ambient …, 2021 - Springer
… possible but in hash function it is not possible ie, from the message digest or hash code no
… Pratik D, Shah PD, Bichkar RS (2018) A Secure spatial domain image steganography using …

[HTML][HTML] A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement

MA Hameed, M Hassaballah, R Abdelazim… - International Journal of …, 2024 - Elsevier
less time to embed secret data than the frequency domain. Mainly, the least significant bit
(LSB) … Then, compare two hash values H a s h 1 and H a s h 2 if they are identical; thus, we can …

[HTML][HTML] Image-to-Image Steganography with Josephus Permutation and Least Significant Bit (LSB) 3-3-2 Embedding

MR Yanuar, S MT, C Apriono, MF Syawaludin - Applied Sciences, 2024 - mdpi.com
… a novel RGB-to-RGB image steganography algorithm that incorporates the Josephus
permutation into the LSB 3-3-2 … in image cryptography, its application in image steganography is …

[PDF][PDF] A Review of Image Steganography Based on Multiple Hashing Algorithm.

A Alenizi, MS Mohammadi, AA Al-Hajji… - … , Materials & Continua, 2024 - researchgate.net
… message improvements to steganography techniques for the spatial domain are used to …
objective of the hash-based least significant bit approach for picture steganography, which …

Enhanced algorithms for steganography based on least significant bit and secret image compression

M Khaled, AHA El-Atta - 2021 Tenth International Conference …, 2021 - ieeexplore.ieee.org
… Page 2 Two techniques for image steganography in the spatial domain are discussed in
this … in a grayscale image utilizing a random methodology and a simple hash function. The …

Extended Method of Least Significant Bits on Colour Images in Steganography

AJ Qasim, R Din, FQA Alyousuf - QALAAI ZANIST JOURNAL, 2024 - journal.lfu.edu.krd
… data into frequency domain representations and store the … The hash-based LSB algorithm
for hiding confidential … by modifying the three least significant bits in colored images, including …

A novel coverless information hiding method based on the most significant bit of the cover image

L Yang, H Deng, X Dang - IEEE Access, 2020 - ieeexplore.ieee.org
… transform the spatial domain to the frequency domain, realizing … steganography is a special
case of spatial and frequency … Then, P0 is randomized using the hash sequence Hp decided …

[HTML][HTML] Enhanced payload volume in the least significant bits image steganography using hash function

YY Ghadi, T AlShloul, ZI Nezami, H Ali, M Asif… - PeerJ Computer …, 2023 - peerj.com
least significant bits for steganography to hide the message in a secure way using a hash
By altering only the least significant bits (LSBs), the changes between the original and stego …

A least significant bit steganographic method using hough transform technique

D Nashat, L Mamdouh - Journal of Networking and Network …, 2023 - iecscience.org
image by secret data bits [8] [10] and [11]. The spatial domain is more widely used in
steganography … Datar, “Improved hash based approach for secure color image steganography

Cover independent image steganography in spatial domain using higher order pixel bits

G Maji, S Mandal, S Sen - Multimedia Tools and Applications, 2021 - Springer
… In spatial domain image steganography, Least Significant Bits (LSB) of cover image pixels
… techniques to hide patient details and other hash values within the documents to check the …