Unmistakable information embedding into the integer wavelet transform domain of an image using an XOR function and a genetic algorithm

V Sabeti - Multimedia Tools and Applications, 2024 - Springer
Although wavelet-based steganography techniques are widely used due to their
advantages, complete embedding data extraction remains one of the most significant …

Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipeline

PK Singh, B Jana, K Datta - Displays, 2022 - Elsevier
Abstract SIFT (Scale Invariant Feature Transform) has recently been used to secure
multimedia materials from geometric and non-geometric attacks. SIFT is commonly used in …

LSB pseudorandom algorithm for image steganography using skew tent map

JL Pichardo-Méndez, L Palacios-Luengas… - Arabian Journal for …, 2020 - Springer
In this paper, we propose a LSB steganography algorithm to hide pseudorandomly sensitive
information in digital images. This algorithm affects the statistic features of the sensitive …

[PDF][PDF] Presenting a New Steganography Method Based on Wavelet Transform in Gray Image

VR Soltaninia, S Talati, SMK Tajani… - Majlesi Journal of …, 2023 - researchgate.net
The ever-increasing development of telecommunications has made secure transmission
one of the most important issues today. Using steganography keeps information away from …

[HTML][HTML] Fuzzy proximity-based robust data hiding scheme with interval threshold

PK Singh, B Jana, K Datta - Soft Computing, 2023 - Springer
Secret communication of sensitive data must progress in a trustworthy environment through
data hiding. Using Mamdani fuzzy logic to identify color proximity at the block level and a …

2DOTS-multi-bit-encoding for robust and imperceptible image watermarking

A Khan - Multimedia Tools and Applications, 2021 - Springer
In this article, a new and improvised image watermarking (IW) technique on colored images
is proposed to mitigate robustness and imperceptibility issues found often in the past …

An Innovative Model for Secure Environment Using Steganography

KG Maheswari, C Siva… - 2022 8th International …, 2022 - ieeexplore.ieee.org
Steganography is a form of safety approach through obscurity, and it's the art of hiding the
message among sender and the intended recipient. it is used to cover secret messages in …

An AES-Based Efficient and Valid QR Code for Message Sharing Framework for Steganography

A Agarwal, S Malik - Expert Clouds and Applications: Proceedings of …, 2022 - Springer
Steganography is one of the methods that may be used to obscure information to facilitate
information exchange. Generally speaking, it may be determined as a study of …

The Framework Design of Feature-based Method on Single-bit Technique Concealing Process using UML Representative

R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
Text steganography is part of information hiding that focuses on concealing sensitive data
within seemingly innocuous textual content. The feature-based method, which hides the …

A systematic review: security information for agent approaches in networks-models and methods.

EH Jasim Halboosa… - Przeglad …, 2023 - search.ebscohost.com
The proliferation of dangers to transmitting vital information across a communication channel
has resulted from the advancement of communication systems. One of the security …