[PDF][PDF] Image steganography using least significant bit and secret map techniques.

A ALabaichi, MAAK Al-Dabbas… - International journal of …, 2020 - researchgate.net
In steganography, secret data are invisible in cover media, such as text, audio, video and
image. Hence, attackers have no knowledge of the original message contained in the media …

[PDF][PDF] A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys

YK Jain, RR Ahirwal - International Journal of Computer Science and …, 2010 - academia.edu
To enhance the embedding capacity of image steganography and provide an imperceptible
stego-image for human vision, a novel adaptive number of least significant bits substitution …

[PDF][PDF] A novel secure image steganography method based on chaos theory in spatial domain

D Bandyopadhyay, K Dasgupta… - International Journal of …, 2014 - researchgate.net
This paper presents a novel approach of building a secure data hiding technique in digital
images. The image steganography technique takes the advantage of limited power of …

Image steganography based on Kirsch edge detection

SK Ghosal, A Chatterjee, R Sarkar - Multimedia Systems, 2021 - Springer
Conventional steganography methods fabricate the secret information into the cover pixels
without analyzing the pixel intensities of an image. As a result, some minor pixel level …

Image steganography based on Canny edge detection, dilation operator and hybrid coding

K Gaurav, U Ghanekar - Journal of Information Security and Applications, 2018 - Elsevier
In this paper, a novel steganography algorithm based on local reference edge detection
technique and exclusive disjunction (XOR) property is proposed. Human eyes are less …

Image steganography based on a new hybrid chaos map and discrete transforms

J Sharafi, Y Khedmati, MM Shabani - Optik, 2021 - Elsevier
With the development of Internet networks, the importance of information security is
becoming more and more significant. Therefore, it is considered necessary to study the …

New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity

AH Mohsin, AA Zaidan, BB Zaidan, OS Albahri… - IEEE …, 2019 - ieeexplore.ieee.org
Steganography is a form of technology utilised to safeguard secret data during
communication in addition to data repository. Numerous researchers have endeavoured to …

An integer wavelet transform image steganography method based on 3D sine chaotic map

MY Valandar, MJ Barani, P Ayubi… - Multimedia Tools and …, 2019 - Springer
Steganography is one of the well-known data hiding methods, which is used in many
security companies and government communications. In this technique, the various types of …

Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

A secure image steganography algorithm based on least significant bit and integer wavelet transform

E Emad, A Safey, A Refaat, Z Osama… - Journal of Systems …, 2018 - ieeexplore.ieee.org
The rapid development of data communication in modern era demands secure exchange of
information. Steganography is an established method for hiding secret data from an …