[PDF][PDF] ADVANCED IMAGE WATERMARKING AND SECRET DATA HIDING FOR MOBILE COMMUNICATION BY USING ADAPTIVE NEURO FUZZY INFERENCE …

MAV Lakshmi - junikhyatjournal.in
using an Adaptive Neuro-Fuzzy Inference System (ANFIS), then new changes are applied to
these pixels using the Fuzzy Wavelet … authentic DCT image steganography through DWT – …

[PDF][PDF] Presenting a New Steganography Method Based on Wavelet Transform in Gray Image

VR Soltaninia, S Talati, SMK Tajani… - Majlesi Journal of …, 2023 - researchgate.net
… capacity in the image, the use of image steganography is much more common than other
steganography methods. In this article, the wavelet transform steganography technique is used…

[HTML][HTML] Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover

A Durafe, V Patidar - Journal of King Saud University-Computer and …, 2022 - Elsevier
… In the following paragraphs, we describe the step-by-step process followed for the image
steganography in the proposed method using both DWT-SVD and IWT-SVD schemes. …

A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
… systematic review of image steganography approaches. Articles … We describe the approaches
to image steganography in this … the existing image steganography approaches to evaluate …

Unmistakable information embedding into the integer wavelet transform domain of an image using an XOR function and a genetic algorithm

V Sabeti - Multimedia Tools and Applications, 2024 - Springer
… In this section, we compare our proposed image steganography method with several
established methods in terms of imperceptibility. Table 16 features this comparison, employing …

[PDF][PDF] Computer and Information Sciences

A Durafe, V Patidar - 2020 - academia.edu
… An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and
pixel adjustment. Soft Computing 22, 1555–1567. Sharifzadeh, F., Akbarizadeh, G., Kavian, …

Fuzzy proximity-based robust data hiding scheme with interval threshold

PK Singh, B Jana, K Datta - Soft Computing, 2023 - Springer
… The least significant bit (LSB) technique is one of the most straightforward and widely …
image steganographic methods. The hidden data are inserted directly into the host image using

A Comprehensive Review of Image Steganography Techniques

I Kumari, RK Aggarwal - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
method studied providing ability to go through any image … of the various image steganography
methods now in use, … , blockchain-based steganography approaches are also reviewed …

2DOTS-multi-bit-encoding for robust and imperceptible image watermarking

A Khan - Multimedia Tools and Applications, 2021 - Springer
… by using steganalysismethod using a fast-recursive algorithm named as 2D Otsu algorithm
in the wavelet domain is proposed for the color images to resolve the security and image

[PDF][PDF] A systematic review: security information for agent approaches in networks-models and methods

EHJ Halboosa, AM Albakrya - Przegląd Elektrotechniczny, 2023 - pe.org.pl
… provided an adaptive hybrid approach for image steganography based on bit reduction,
pixel correction, fuzzy logic, and integer wavelet transform to conceal data in the stego-image. …