The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

A survey on healthcare data: a security perspective

AK Singh, A Anand, Z Lv, H Ko, A Mohan - ACM Transactions on …, 2021 - dl.acm.org
With the remarkable development of internet technologies, the popularity of smart healthcare
has regularly come to the fore. Smart healthcare uses advanced technologies to transform …

A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm

HR Kanan, B Nazeri - Expert systems with applications, 2014 - Elsevier
Steganography is knowledge and art of hiding secret data into information which is largely
used in information security systems. Various methods have been proposed in the literature …

Very high capacity image steganography technique using quotient value differencing and LSB substitution

G Swain - Arabian Journal for Science and Engineering, 2019 - Springer
This article proposes a very high capacity steganography technique using differencing and
substitution mechanisms. It divides the image into non-overlapped 3 * 3 3× 3 pixel blocks …

SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images

S Arunkumar, V Subramaniyaswamy, V Vijayakumar… - Measurement, 2019 - Elsevier
The advances in computer technologies and the Internet have made rapid strides and
breakthroughs in the field of data communication, which nowadays, is easily accessed …

Data hiding: current trends, innovation and potential challenges

AK Singh - ACM Transactions on Multimedia Computing …, 2020 - dl.acm.org
With the widespread growth of digital information and improved internet technologies, the
demand for improved information security techniques has significantly increased due to …

[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021 - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …

A reversible data hiding method by histogram shifting in high quality medical images

LC Huang, LY Tseng, MS Hwang - Journal of Systems and Software, 2013 - Elsevier
Enormous demands for recognizing complicated anatomical structures in medical images
have been demanded on high quality of medical image such as each pixel expressed by 16 …

Transform domain-based invertible and lossless secret image sharing with authentication

L Xiong, X Zhong, CN Yang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Secret Image Sharing (SIS) as a secure data sharing scheme in multiple cover images, has
become an increasing researchers' concern. In traditional SIS, the cover image can't be …

Joint encryption and compression-based watermarking technique for security of digital documents

AK Singh, S Thakur, A Jolfaei, G Srivastava… - ACM Transactions on …, 2021 - dl.acm.org
Recently, due to the increase in popularity of the Internet, the problem of digital data security
over the Internet is increasing at a phenomenal rate. Watermarking is used for various …