Steganography-based voice hiding in medical images of COVID-19 patients

M Yildirim - Nonlinear Dynamics, 2021 - Springer
A novel image steganography technique in order to hide the ciphered voice data has been
suggested in this work. The doctor's voice comments belonging to a coronavirus disease …

Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem

M Jain, A Kumar, RC Choudhary - Brain informatics, 2017 - Springer
In this article, we have proposed an improved diagonal queue medical image
steganography for patient secret medical data transmission using chaotic standard map …

Medical image steganographic algorithm via modified LSB method and chaotic map

AA Karawia - IET Image Processing, 2021 - Wiley Online Library
Many methods of hiding information in an image are existing now. The least significant bit is
the famous method used in steganographic algorithms. Medical image steganography is a …

Image steganography based on least significant bit (LSB) and 4-dimensional Lu and Liu chaotic system

JN Shehab, HA Abdulkadhim - 2018 International Conference …, 2018 - ieeexplore.ieee.org
One of the tasks in steganography is extend area in the cover media for embedding more
secret messages with enhancing security key and then extract messages with minimum …

A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach

OY Abdulhammed - The Journal of Supercomputing, 2024 - Springer
After the tremendous development and fast growth in communication systems and electronic
devices, information security and preservation have become one of the most important …

[PDF][PDF] Encryption-based image steganography technique for secure medical image transmission during the COVID-19 pandemic

S Alkhliwi - International Journal of Computer Science & Network …, 2021 - researchgate.net
COVID-19 poses a major risk to global health, highlighting the importance of faster and
proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests …

FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks

MAM El-Bendary - Multimedia Tools and Applications, 2017 - Springer
In this research paper, robust and reliable encrypted steganography technique with the error
control schemes is presented. It also, investigates the performance of this technique with …

Steganography in color images with random order of pixel selection and encrypted text message embedding

K Kordov, S Zhelezov - PeerJ Computer Science, 2021 - peerj.com
Abstract Information security is major concern in modern digital ages, and the outdated
algorithms need to be replaced with new ones or to be improved. In this article a new …

[PDF][PDF] Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system

HA Abdulkadhim, JN Shehab - International Journal of Electrical and …, 2022 - academia.edu
Although variety in hiding methods used to protect data and information transmitted via
channels but still need more robustness and difficulty to improve protection level of the …

Secured communication of text and audio using image steganography

M Anusha, KN Bhanu… - … Conference on Electronics …, 2020 - ieeexplore.ieee.org
Data security has gained an utmost importance due to the unprecedented increase in the
data generated over the internet, which is a basic necessity of any application in information …