R Kumar, KH Jung - Information Sciences, 2020 - Elsevier
Abstract Pixel-Value-Ordering (PVO) based reversible data hiding schemes provide high- fidelity stego-images with moderate embedding capacity. In this paper, a novel reversible …
M Suresh, IS Sam - Journal of King Saud University-Computer and …, 2022 - Elsevier
A novel approach is presented in this paper for hiding the data using Fractional Grey Wolf Optimization. In this work, the key frames are extracted using the Structural Similarity Index …
The present paper builds a security system to encrypt and hide important text data. The system utilized an AES method to conduct an encryption process, followed by hiding the …
P Chowdhuri, B Jana - Journal of Information Security and Applications, 2020 - Elsevier
Hiding information in dual images is a new aspect in the field of multimedia security to increase security, enhance visual quality as well as improve embedding capacity. Few data …
V Shukla, A Mishra - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
As everyone is aware that security of data communication is essential in modern scenario. There is a continuous fight between cryptographers and cryptanalysists. Cryptographers …
J Sun, H Cai, Z Gao, C Wang, H Zhang - Nonlinear Dynamics, 2023 - Springer
In this paper, a new hyperchaotic system without an equilibrium point is proposed and analyzed. A novel steganography technique is advanced by combining the hyperchaotic …
Current image steganography methods are working by assigning an image as a cover ile then embed the payload within it by modifying its pixels, creating the stego image. However …
Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the tradeoff between managing high …