ZM Zaw, SW Phyo - International Journal of Computer (IJC), 2015 - core.ac.uk
… and cryptography are both ways to protect the data security … enhancement of not only image but also information security based on the combination of cryptography and steganography …
L Zhou, G Feng, L Shen, X Zhang - IEEE Signal Processing …, 2019 - ieeexplore.ieee.org
… , which makes the adversarial images obtain the similar classification results before and after steganography. In addition, to further improve security of the adversarial images, we also …
N Akhtar, P Johri, S Khan - 2013 5th International Conference …, 2013 - ieeexplore.ieee.org
… In this paper, we present a LSB based steganography method which is more secure and robust than plain LSB method. Rather than storing the message bits sequentially, they are …
MS Sreekutty, PS Baiju - 2017 international conference on …, 2017 - ieeexplore.ieee.org
… of medical image during transmission. Due to this we should provide sufficient security to the medical image to prevent unauthorized access[2]. For this we used steganographic …
J Luo, P He, J Liu, H Wang, C Wu, S Zhou - … Communication and Image …, 2023 - Elsevier
… the security of steganography, we propose a reversible adversarial steganography based … to generate stego images s using traditional adaptive imagesteganography by designing the …
S Elshare, NN El-Emam - … Networks and Information Security, 2018 - researchgate.net
… steganography algorithm has been constructed to hide a secret data in a gray and a color images… (DHEA) to modify multi-level steganography (MLS). The suggested hiding algorithm is …
SJ Gladwin, PL Gowthami - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
… the features of steganography and cryptography techniques by embedding a crypto text/image into an image. Embedding encrypted messages could be more secure and effective. This …
J Luo, P He, J Liu, H Wang, C Wu, C Yuan, Q Xia - Applied Intelligence, 2023 - Springer
… the security in imagesteganography by … security of imagesteganography by adaptively adding adversarial perturbations into cover images according to characteristics of image …
S Bharti, S Behal, V Sharma - 2018 Second International …, 2018 - ieeexplore.ieee.org
… In this section, various methods for steganography could be the related as: Text and Imagesteganography techniques. The proposed work uses several techniques like: Least …