A review on steganography and cryptography

R Mishra, P Bhanodiya - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Today's information world is a digital world. Data transmission over an unsecure channel is
becoming a major issue of concern nowadays. And at the same time intruders are spreading …

Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System

V Barannik, Y Ryabukha, N Barannik… - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
Develloped a new approach of indirect steganographic embedding of data based on
modifications of the basis of the polyadic system. In comparison with other methods indirect …

[HTML][HTML] Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces

S Al-Nofaie, A Gutub, M Al-Ghamdi - … of King Saud University-Computer and …, 2021 - Elsevier
Steganography is the process of hiding data within multimedia communication between
parties by embedding the secret data inside a carrier file to be protected during its …

[PDF][PDF] Information security based on steganography & cryptography techniques: A review

P Kumar, VK Sharma - International Journal, 2014 - researchgate.net
Over past few decades, with the advancement of communication technology the use of
internet has grown extremely to exchange information without any distance barrier …

[PDF][PDF] A novel technique for data steganography

AY Hindi, MO Dwairi, ZA AlQadi - Engineering, Technology & …, 2019 - academia.edu
In this paper, a novel stego-method will be introduced, which can be used to hide any secret
message in any holding color image. The proposed method will be implemented and tested …

A novel steganography algorithm for hiding text in image using five modulus method

FA Jassim - arXiv preprint arXiv:1307.0642, 2013 - arxiv.org
The needs for steganographic techniques for hiding secret message inside images have
been arise. This paper is to create a practical steganographic implementation to hide text …

A genetic algorithm based steganography using discrete cosine transformation (GASDCT)

A Khamrui, JK Mandal - Procedia Technology, 2013 - Elsevier
In this paper a Genetic Algorithm based steganographic technique in frequency domain
using discrete cosine transform has been proposed. A 2× 2 sub mask of the source image is …

Optical character recognition for quranic image similarity matching

F Alotaibi, MT Abdullah, RBH Abdullah… - IEEE …, 2017 - ieeexplore.ieee.org
The detection and recognition and then conversion of the characters in an image into a text
are called optical character recognition (OCR). A distinctive-type of OCR is used to process …

[PDF][PDF] A new approach of data hiding in images using cryptography and steganography

P Bharti, R Soni - International Journal of Computer Applications, 2012 - Citeseer
Cryptography is the science of using mathematics to encrypt and decrypt data and
Steganography is the art and science of hiding communication; a steganographic system …

[HTML][HTML] A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters' Diacritics and Image Layers

SS Alqahtany, AB Alkhodre, A Al Abdulwahid… - Applied Sciences, 2023 - mdpi.com
Steganography is a widely used technique for concealing confidential data within images,
videos, and audio. However, using text for steganography has not been sufficiently explored …