[HTML][HTML] Hiding patients' medical reports using an enhanced wavelet steganography algorithm in DICOM images

MA Ahmad, M Elloumi, AH Samak… - Alexandria Engineering …, 2022 - Elsevier
In the latest years, there is an increasing emphasis on DICOM medical images, especially in
digital medical images transmission to e-health services. Besides, the confidentiality and …

An efficient and secure technique for image steganography using a hash function

ZI Nezami, H Ali, M Asif, H Aljuaid, I Hamid… - PeerJ Computer …, 2022 - peerj.com
Steganography is a technique in which a person hides information in digital media. The
message sent by this technique is so secret that other people cannot even imagine the …

An effective security assessment approach for Internet banking services via deep analysis of multimedia data

S Khattak, S Jan, I Ahmad, Z Wadud, FQ Khan - Multimedia Systems, 2021 - Springer
With the emergence of cyber technology, the biggest evolution has been observed in the
use of Internet for financial purposes, in particular for the Internet banking sector. However …

Enhanced flipping technique to reduce variability in image steganography

S Kamil, SNHS Abdullah, MK Hasan, FA Bohani - IEEE Access, 2021 - ieeexplore.ieee.org
Steganography algorithms hide the secret message in the cover image and provide
imperceptibility to the attacker. The Least Significant Bit (LSB) algorithm is the preferred data …

Steganography in IoT: information hiding with APDS-9960 proximity and gestures sensor

K Koptyra, MR Ogiela - Sensors, 2022 - mdpi.com
This article describes a steganographic system for IoT based on an APDS-9960 gesture
sensor. The sensor is used in two modes: as a trigger or data input. In trigger mode, gestures …

MobiScan: An enhanced invisible screen‐camera communication system for IoT applications

X Zhang, J Liu, Z Ba, Y Tao… - Transactions on Emerging …, 2022 - Wiley Online Library
In recent years, dynamic and invisible screen‐camera short‐range communication for IoT
devices have become a popular research field due to its superior user experience and no …

[HTML][HTML] Enhanced payload volume in the least significant bits image steganography using hash function

YY Ghadi, T AlShloul, ZI Nezami, H Ali, M Asif… - PeerJ Computer …, 2023 - peerj.com
The art of message masking is called steganography. Steganography keeps communication
from being seen by any other person. In the domain of information concealment within …

HNMH: A New Hybrid Approach Based on Near Maximum Histogram and LSB Technique for Image Steganography

A Sondas, H Kurnaz - Wireless Personal Communications, 2022 - Springer
In this paper, a new histogram-based approach for digital image steganography is
introduced. It stems from the idea of utilizing the near maximum values in the image …

Dynamic data hiding capacity enhancement for the Hybrid Near Maximum Histogram image steganography based on Multi-Pixel-Pair approach

A Sondas, NB Erturk - Multimedia Tools and Applications, 2024 - Springer
Increasing data hiding capacity and making it difficult to detect presence of any confidential
data in stego images are the key objectives in contemporary image steganography research …

[PDF][PDF] A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism.

N Wu, X Chen, JM Adeke, J Zhao - Computers, Materials & …, 2024 - cdn.techscience.cn
Recently, deep image-hiding techniques have attracted considerable attention in covert
communication and highcapacity information hiding. However, these approaches have …