Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …

Coverless image steganography based on optical mark recognition and machine learning

SS Al Hussien, MS Mohamed, EH Hafez - IEEE Access, 2021 - ieeexplore.ieee.org
The most significant factor to consider during private information transmission through the
internet (ie, insecure channel) is security. So, to keep this data from unauthorized access …

Analysis review on spatial and transform domain technique in digital steganography

FQA Alyousuf, R Din, AJ Qasim - Bulletin of Electrical Engineering and …, 2020 - beei.org
This paper presents several techniques used in digital steganography in term of spatial and
transform domain. Additionally, it analyses the performance and the metric evaluation of the …

A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

[PDF][PDF] Novel steganography scheme using Arabic text features in Holy Quran

HK Tayyeh, MS Mahdi, ASA AL-Jumaili - International Journal of …, 2019 - academia.edu
With the rapid growth of the Internet and mobile devices, the need for hidden
communications has significantly increased. Steganography is a technique introduced for …

[PDF][PDF] Hybrid information security system via combination of compression, cryptography, and image steganography

WA Awadh, AS Alasady… - International Journal of …, 2022 - faculty.uobasrah.edu.iq
Today, the world is experiencing a new paradigm characterized by dynamism and rapid
change due to revolutions that have gone through information and digital communication …

[PDF][PDF] A new encrypted method in image steganography

S Pramanik, RP Singh, R Ghosh - Indonesian Journal of Electrical …, 2019 - researchgate.net
Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a
cover image using image steganography. CAPTCHA are the crazy codes. They are used in …

Coverless Image Steganography Based on Jigsaw Puzzle Image Generation.

AHS Saad, MS Mohamed… - Computers, Materials & …, 2021 - search.ebscohost.com
Current image steganography methods are working by assigning an image as a cover ile
then embed the payload within it by modifying its pixels, creating the stego image. However …

Implementation Of Least Significant Bit (LSB) Algorithm For Data Security In Digital Imagery

PSH Hasugian… - Jurnal Info Sains …, 2020 - ejournal.seaninstitute.or.id
In this study, a software was built that can insert text messages into image files
(steganography) and steganalisis or detect the presence or absence of secret messages in …

Robust large image steganography using LSB algorithm and 5D hyper-chaotic system

JN Shehab, HA Abdulkadhim… - Bulletin of Electrical …, 2021 - beei.org
This paper contains a robust hiding system proposed to hide and reconstruct efficiently a
large size secret image based on merging encrypting and hiding. This approach deals with …