A secure image steganography using improved LSB technique and Vigenere cipher algorithm

L Voleti, RM Balajee, SK Vallepu… - … and Smart Systems …, 2021 - ieeexplore.ieee.org
… [14, 15] RGB steganography to enhance data transfer protection across the Internet. The 24
bit RGB image is used for cover image to embed secret details. The X-Box mapping has 16 …

[PDF][PDF] Review of the Literature on the Steganography Concept

F Şahin, T Çevik, M Takaoğlu - International Journal of Computer …, 2021 - researchgate.net
… distorted image and the reference image. Low MSE increases the efficiency of the image
steganography technique… Most of the images on the Internet consist of a rectangular map of the …

Color image steganography in YCbCr space

ZA Alwan, HM Farhan… - International Journal of …, 2020 - search.proquest.com
… This et alion will discuss the results of the experiment regarding the concealment of the
necessary data employing the steganography method put forward in this paper. There is a …

[PDF][PDF] Categorization of spatial domain techniques in image steganography: A revisit

QM Haref, MS Taha, MSM Rahim… - Journal of Advanced …, 2021 - researchgate.net
… review of the spatial image steganographic domain, with further … steganography in general,
as well as image steganographic … A novel LSB-based approach using X-box mapping has …

Improving data security using modified LSB-based image steganography technique

MJ AlSinani, A Kayed, G Al Farsi - Journal of Hunan University Natural …, 2020 - jonuns.com
… LSB based image steganography using X-Box mapping. [C]// … using improved LSBbased
image steganography technique. [… transformation in LSB-based image steganography. [C]// …

A review of steganography techniques

AM Khalaf, K Lakhtaria - AIP Conference Proceedings, 2024 - pubs.aip.org
… LSB-based image steganography using x-box mapping." Advances in Computing,
Communications, and Informatics (ICACCI, 2014 International Conference on. IEEE, 2014. …

[PDF][PDF] HARDWARE IMPLEMENTATION METHOD OF SECRET DATA SECURITY ON FPGA BASED ON ZIG-ZAG MAP ENCRYPTION AND STEGANO ALGORITHMS

BK YAKTI, SA SUDIRO, S MADENDA… - Journal of Theoretical …, 2022 - jatit.org
method is that the resources obtained are large (2411 slices) because the method must call
the X-BOX … of the steganography method using LSB using grayscale images by ignoring the …

An efficient and secure technique for image steganography using a hash function

ZI Nezami, H Ali, M Asif, H Aljuaid, I Hamid… - PeerJ Computer …, 2022 - peerj.com
… In many bins, the X-Box mapping has 16 different values. “X” represents any integer from 0
… very secure LSB image steganography algorithm. The proposed technique used the Caesar …

[PDF][PDF] A Novel Approach for Data Steganography

MV Rajani, MA Saxena - academia.edu
… In this generation, steganography is mostly used on computers with digital data being the …
Figure1 shows the block diagram of a simple image steganography system. Secret Image

[PDF][PDF] A Review on Steganography Techniques

P Thakur, MT Scholar, SB MP - academia.edu
… for embedding data in a cover image with good capability, while it is … an method for Image
steganography based on LSB technique using X-box mapping presented where they it used