AB Sallow, ZM Taha, AS Nori - AL-Rafidain Journal of Computer …, 2010 - mosuljournals.com
Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the …
ZA Alwan, HM Farhan… - International Journal of …, 2020 - search.proquest.com
Steganography is a best method for in secret communicating information during the transference of data. Images are an appropriate method that used in steganography can be …
D Kumar - 2019 International Conference on Issues and …, 2019 - ieeexplore.ieee.org
For the security related issues over internet two main techniques are used first is Cryptography and second is Steganography. Both are basically used for data security …
S Solak, U Altınışık - International Journal of Computer (IJC), 2018 - academia.edu
Steganography hides various data within different file types, which ensures secure communication. In recent years, the science of steganography has gained importance, due …
Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical …
D Ratnasari, AS Aji - International Journal of Applied Business and …, 2019 - pubs.ascee.org
Steganography technique is the art of hiding information in the carrier media to prevent humans from detecting messages or confidential information inside the carrier media …
AK Mandal, MNM Kahar - International Journal of Signal Processing …, 2017 - academia.edu
Steganography has been emerged as a prominent technique for communicating secret information in a proper multimedia career. In image steganography, least significant bit …
RK Thakur, C Saravanan - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
The technique for hiding any information in other information is known as Steganography. According to the technique of Least Significant Bit encryption, secret message is embedded …
A Gangwar, V Shrivastava - International Journal of Computer …, 2012 - researchgate.net
This paper introduces a best approach for Least Significant Bit (LSB) based on image steganography that enhances the existing LSB substitution techniques to improve the …