Security enhancement in image steganography using neural networks and visual cryptography

KS Seethalakshmi, BA Usha… - … on Computation System …, 2016 - ieeexplore.ieee.org
… Since electronic voting systems are vulnerable to malicious attacks, a novel approach of
using cryptography along with image steganography is used in this paper. Here MySQL …

[PDF][PDF] Security enhancement system based on the integration of cryptography and steganography

ZM Zaw, SW Phyo - International Journal of Computer (IJC), 2015 - core.ac.uk
… and cryptography are both ways to protect the data securityenhancement of not only image
but also information security based on the combination of cryptography and steganography

On security enhancement of steganography via generative adversarial image

L Zhou, G Feng, L Shen, X Zhang - IEEE Signal Processing …, 2019 - ieeexplore.ieee.org
… , which makes the adversarial images obtain the similar classification results before and
after steganography. In addition, to further improve security of the adversarial images, we also …

Enhancing the security and quality of LSB based image steganography

N Akhtar, P Johri, S Khan - 2013 5th International Conference …, 2013 - ieeexplore.ieee.org
… In this paper, we present a LSB based steganography method which is more secure and
robust than plain LSB method. Rather than storing the message bits sequentially, they are …

Security enhancement in image steganography for medical integrity verification system

MS Sreekutty, PS Baiju - 2017 international conference on …, 2017 - ieeexplore.ieee.org
… of medical image during transmission. Due to this we should provide sufficient security to
the medical image to prevent unauthorized access[2]. For this we used steganographic

Reversible adversarial steganography for security enhancement

J Luo, P He, J Liu, H Wang, C Wu, S Zhou - … Communication and Image …, 2023 - Elsevier
… the security of steganography, we propose a reversible adversarial steganography based …
to generate stego images s using traditional adaptive image steganography by designing the …

[PDF][PDF] Modified multi-level steganography to enhance data security

S Elshare, NN El-Emam - … Networks and Information Security, 2018 - researchgate.net
steganography algorithm has been constructed to hide a secret data in a gray and a color
images… (DHEA) to modify multi-level steganography (MLS). The suggested hiding algorithm is …

Combined cryptography and steganography for enhanced security in suboptimal images

SJ Gladwin, PL Gowthami - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
… the features of steganography and cryptography techniques by embedding a crypto text/image
into an image. Embedding encrypted messages could be more secure and effective. This …

Improving security for image steganography using content-adaptive adversarial perturbations

J Luo, P He, J Liu, H Wang, C Wu, C Yuan, Q Xia - Applied Intelligence, 2023 - Springer
… the security in image steganography by … security of image steganography by adaptively
adding adversarial perturbations into cover images according to characteristics of image

Security enhancements for high quality image transaction with hybrid image steganography algorithm

S Bharti, S Behal, V Sharma - 2018 Second International …, 2018 - ieeexplore.ieee.org
… In this section, various methods for steganography could be the related as: Text and
Image steganography techniques. The proposed work uses several techniques like: Least …