SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT

S Dhawan, C Chakraborty, J Frnda, R Gupta… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a domain where the transfer of big data is taking place every single
second. The security of these data is a challenging task; however, security challenges can …

A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images

M Nazari, M Mehrabian - Multimedia Tools and Applications, 2021 - Springer
Nowadays, secure medical data transmission is an essential issue in telemedicine through
unsecured channels. Watermarking methods are widely used to provide optimal security for …

High payload image steganography scheme with minimum distortion based on distinction grade value method

MS Taha, MSM Rahem, MM Hashim… - Multimedia Tools and …, 2022 - Springer
Presently, the design and development of an effective image steganography system are
facing several challenges including the low capacity, poor robustness and imperceptibility …

Secure medical image steganography method based on pixels variance value and eight neighbors

MK Abed, MM Kareem, RK Ibrahim… - 2021 International …, 2021 - ieeexplore.ieee.org
The security aspect of processes and methodologies in the information and communication
technology era is the main part. The security of information should a key priority in the secret …

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

S Rahman, J Uddin, H Hussain, A Ahmed, AA Khan… - Scientific Reports, 2023 - nature.com
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …

Hybrid multistage framework for data manipulation by combining cryptography and steganography

OM Osman, MEA Kanona, MK Hassan… - Bulletin of Electrical …, 2022 - beei.org
In today's rapidly growing communication and internet technologies, such as 5G, cloud
computing, and blockchain, information security has become a critical component. When …

Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats

S Rahman, J Uddin, H Hussain, S Jan, I Khan… - Sustainability, 2023 - mdpi.com
The Internet and Big Data expansion have motivated the requirement for more generous
stockpiling to hold and share information. Against the current era of information …

[PDF][PDF] An improved method for combine (LSB and MSB) based on color image RGB

SA Mahdi - Engineering and Technology Journal, 2021 - iasj.net
Engineering and Technology Journal An Improved Method for Combine (LSB and MSB) Based
on Color Image RGB Page 1 Engineering and Technology Journal Vol. 39, Part B (2021), No. 01 …

Multimedia Security Through 1D Chaotic Systems: Review and Analysis

A Daoui, AA Abd El-Latif - Recent Advancements in Multimedia Data …, 2023 - igi-global.com
The use of 1D chaotic maps in multimedia security applications is becoming increasingly
attractive due to their advantages, including the high sensitivity to both initial and control …

[PDF][PDF] A Review on the Recent Trends of Image Steganography for VANET Applications.

AS Ansari - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Image steganography is a technique of concealing confidential information within an image
without dramatically changing its outside look. Whereas vehicular ad hoc networks …