A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

[PDF][PDF] A combination of least significant bit and deflate compression for image steganography

HK Tayyeh, ASA Al-Jumaili - International Journal of Electrical and …, 2022 - academia.edu
Steganography is one of the cryptography techniques where secret information can be
hidden through multimedia files such as images and videos. Steganography can offer a way …

An Image Encryption Algorithm Based on the Improved Sine‐Tent Map

Z Gao, Z Liu, L Wang - Discrete Dynamics in Nature and …, 2021 - Wiley Online Library
This paper makes use of the characteristics of initial sensitivity and randomness of the
chaotic map to design an image encryption algorithm based on the sine map and the tent …

[PDF][PDF] High-security image steganography technique using XNOR operation and fibonacci algorithm

AA Almayyahi, R Sulaiman, F Qamar… - International Journal of …, 2020 - researchgate.net
Since the number of internet users is increasing and sensitive information is exchanging
continuously, data security has become a problem. Image steganography is one of the ways …

[PDF][PDF] Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things

SA Jassim, AK Farhan - Int. J. Electr. Comput. Eng.(IJECE), 2022 - academia.edu
Sensitive data exchanging among things over the internet must be protected by a powerful
cryptographic system. Conventional cryptographic such as advanced encryption standard …

Using steganography techniques for implicit authentication to enhance sensitive data hiding

RN Kadhum, NHM Ali - International Journal of Nonlinear …, 2022 - ijnaa.semnan.ac.ir
Smartphones recently become indispensable to users due to the services provided, like
Internet access and important applications (eg, financial and health applications). which …

[PDF][PDF] A comprehensive study of digital image steganographic techniques

H Hussain, AA Khan, A Ahmed… - IEEE Access https://doi …, 2023 - academia.edu
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

Steganography and cryptography techniques based secure data transferring through public network channel

MA Naser, SMK Al-alak, AM Hussein… - Baghdad Science …, 2022 - bsj.uobaghdad.edu.iq
Attacking a transferred data over a network is frequently happened millions time a day. To
address this problem, a secure scheme is proposed which is securing a transferred data …

[PDF][PDF] A secure and high capacity image steganography approach using Huffman coding and RSA encryption

EL Kadhem, SS Baawi - Journal of Al-Qadisiyah for computer science and …, 2023 - iasj.net
Steganography is the practice of hiding data, such as images, videos, or text, within a cover
image without it being detectable by the human eye. Several factors, such as the capacity …

[PDF][PDF] Video steganography using 3D distance calculator based on YCbCr color components

EJ Baker, AA Majeed, SA Alazawi, S Kasim… - Indonesian Journal of …, 2021 - core.ac.uk
Steganography techniques have taken a major role in the development in the field of
transferring multimedia contents and communications. Therefore, field of steganography …