Robust image steganography approach based on RIWT-Laplacian pyramid and histogram shifting using deep learning

A Sukumar, V Subramaniyaswamy, L Ravi… - Multimedia …, 2021 - Springer
Nowadays, highly sensitive medical images are vulnerable to data threats and privacy
attacks. They must be kept secure while transmitting them across insecure channels …

Optimized support vector neural network and contourlet transform for image steganography

VK Reshma, RS Vinod Kumar, D Shahi… - Evolutionary …, 2022 - Springer
Image steganography is one of the promising and popular techniques used to secure the
sensitive information. Even though there are numerous steganography techniques for hiding …

High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform

IJ Kadhim, P Premaratne, PJ Vial - Cognitive Systems Research, 2020 - Elsevier
The importance of image steganography is unquestionable in the field of secure multimedia
communication. Imperceptibility and high payload capacity are some of the crucial parts of …

[PDF][PDF] Secured image steganography using different transform domain

A Kaushal, V Choudhary - International Journal of Computer Applications, 2013 - Citeseer
In today's communication world, data sharing and transfer is increasing exponentially. The
threat of an attacker accessing secret information has been an ever existing concern for the …

A secure spatial domain image steganography using genetic algorithm and linear congruential generator

PD Shah, RS Bichkar - … on Intelligent Computing and Applications: ICICA …, 2018 - Springer
Significant increase in data traffic over the Internet has given rise to many data security
issues. Steganography is a technique which is used to hide the existence of secret …

HNMH: A New Hybrid Approach Based on Near Maximum Histogram and LSB Technique for Image Steganography

A Sondas, H Kurnaz - Wireless Personal Communications, 2022 - Springer
In this paper, a new histogram-based approach for digital image steganography is
introduced. It stems from the idea of utilizing the near maximum values in the image …

An efficient steganography technique based on S2OA & DESAE model

B Hemanta Kumar - Multimedia Tools and Applications, 2023 - ir.vignan.ac.in
This paper gives a novel and efficient steganography technique based on hybrid algorithms
that improves the various important parameters like PSNR, MSE, IF, capacity, security. It …

Identification of content-adaptive image steganography using convolutional neural network guided by high-pass kernel

S Agarwal, KH Jung - Applied Sciences, 2022 - mdpi.com
Digital images are very popular and commonly used for hiding crucial data. In a few
instances, image steganography is misused for communicating with improper data. In this …

A secure image steganography algorithm based on least significant bit and integer wavelet transform

E Emad, A Safey, A Refaat, Z Osama… - Journal of Systems …, 2018 - ieeexplore.ieee.org
The rapid development of data communication in modern era demands secure exchange of
information. Steganography is an established method for hiding secret data from an …

Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data

AHM Almawgani, ARH Alhawari, AT Hindi… - … systems and signal …, 2022 - Springer
Digital images are commonly used in steganography due to the popularity of digital image
transfer and exchange through the Internet. However, the tradeoff between managing high …