[引用][C] Comparison of image steganography techniques

S Goel, A Rana, M Kaur - International Journal of Computers and Distributed …, 2013

[HTML][HTML] A sparse representation based image steganography using particle swarm optimization and wavelet transform

SI Nipanikar, VH Deepthi, N Kulkarni - Alexandria engineering journal, 2018 - Elsevier
With the growth of information technology, information security is a major concern in the
interactive environment, where there is no security for the messages send to and from the …

[PDF][PDF] A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys

YK Jain, RR Ahirwal - International Journal of Computer Science and …, 2010 - academia.edu
To enhance the embedding capacity of image steganography and provide an imperceptible
stego-image for human vision, a novel adaptive number of least significant bits substitution …

[PDF][PDF] An enhanced method for data hiding using 2-bit xor in image steganography

K Joshi, R Yadav, G Chawla - International Journal of Engineering …, 2017 - academia.edu
As we all know security is needed when we want to send data over any medium so this
requires a secure medium to send data. That's why steganography comes in mind whose …

An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm

S Pramanik - Multimedia Tools and Applications, 2023 - Springer
Steganography is the art and a science of obscuring the presence of communication by
hiding content in electronic media and so obscuring the presence of communication from the …

A new steganography algorithm using hybrid fuzzy neural networks

A Saleema, T Amarunnishad - Procedia Technology, 2016 - Elsevier
In recent years, image steganography has been one of the emerging research areas. As the
field of information technology is advancing, the need of information security is increasing …

Secure data hiding by fruit fly optimization improved hybridized seeker algorithm

R Roselin Kiruba, T Sree Sharmila - Multidimensional systems and signal …, 2021 - Springer
The recent growth of World Wide Web (WWW) and development of the next-generation
internet facilitates a huge amount of data being conveniently transmitted via wireless …

[HTML][HTML] Image steganography using genetic algorithm for cover image selection and embedding

MK Shyla, KBS Kumar, RK Das - Soft computing letters, 2021 - Elsevier
Data interchange through internet becomes an eminent technique and hence data security
has become a big challenge in the field of communication with the increased use of internet …

[PDF][PDF] Improved capacity image steganography algorithm using 16-pixel differencing with n-bit LSB substitution for RGB images

MS Arya, M Rani, CS Bedi - International Journal of Electrical and …, 2016 - academia.edu
With the intrusion of internet into the lives of every household and terabytes of data being
transmitted over the internet on daily basis, the protection of content being transmitted over …

[PDF][PDF] FPGA implementation of robust image steganography technique based on least significant bit (LSB) in spatial domain

EA Elshazly, SAS Abdelwahab, RM Fikry… - … Journal of Computer …, 2016 - researchgate.net
There are many different data hiding techniques, the Least Significant Bit (LSB) based
steganography algorithm is considered as one of the most popular algorithms in the spatial …