[PDF][PDF] New image steganography method by matching secret Message with pixels of cover image (SMM)

AA Ali, AS Saad - … Journal of Computer Science Engineering and …, 2013 - academia.edu
Steganography has been widely used, including in recent historical times and the present
day. It can be defined as the study of invisible communication that usually deals with the …

[PDF][PDF] Securing data using deep hiding selected least significant bit and adaptive swarm algorithm

BII Aljidi, S Perumal, SA Pitchay - Indonesian Journal of Electrical …, 2022 - academia.edu
The emphasis on data protection is improved in particular with respect to the transmission
protocols utilized. Different research on numerous data protection areas such as …

[PDF][PDF] Data Hiding in Image using Multilevel 2-D DWT and ASCII Conversion and Cyclic Mathematical Function based Cryptography

AF Tukiwala, SD Degadwala - International Journal of Computer …, 2014 - Citeseer
The preserving secrecy of sensitive data becomes very important in today digital
communication. Steganography is the discipline of exchanging top secret information by …

[PDF][PDF] An Efficient Data Embedding Techniques in Image using Levelling of 2-D DWT and Cryptography

U Scholar - 2018 - academia.edu
The protecting mystery of delicate information turns out to be essential in today
computerized correspondence. Steganography is the train of trading top mystery data by …

[PDF][PDF] Implementation of Video Steganography Using Hash Function in LSB

A Pradesh - academia.edu
Data hiding is the process of embedding information in a data source without changing its
perceptual quality. There are various techniques used for data hiding namely cryptography …

[PDF][PDF] An Efficient Data Embedding Techniques in Image using Levelling of 2-D DWT and Cryptography

S Degadwala, A Mahajan, D Vyas, M Purohit - 2018 - academia.edu
The protecting mystery of delicate information turns out to be essential in today
computerized correspondence. Steganography is the train of trading top mystery data by …

[PDF][PDF] Implementation of Video Steganography Using Hash Function in LSB

S Chitra, N Thoti - researchgate.net
Data hiding is the process of embedding information in a data source without changing its
perceptual quality. There are various techniques used for data hiding namely cryptography …

[PDF][PDF] Adaptive Steganography Based on Logistic Map

FG Beram, SG Beram - ijcatr.com
umerous novel algorithms have been proposed in the fields of steganography with the goals
of increase security, capacity and imperceptibility. In this paper, we introduced a new blind …

[引用][C] Various Techniques of Data Hiding in Image

MAFTM Sheshang, D Degadwala