[PDF][PDF] A literature review on various recent steganography techniques

A Arya, S Soni - International Journal on Future Revolution in …, 2018 - researchgate.net
In this paper we review different Steganography techniques which not only hides the
message behind the image but also provides security. Data is generally in the form of text …

Enhancing data security using DES-based cryptography and DCT-based steganography

A Solichin, EW Ramadhan - 2017 3rd International Conference …, 2017 - ieeexplore.ieee.org
The security and privacy of the data transmitted is an important aspect of the exchange of
information on the Internet network. Cryptography and Steganography are two of the most …

Improved detection of 1-2-4 lsb steganography and rsa cryptography in color and grayscale images

S Goyal, M Ramaiya, D Dubey - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Steganography is the art of the hidden data in such a way that it detection of hidden
knowledge prevents. As the necessity of security and privacy increases, the need of the …

An Approach to secure data transmission through the use of cryptography and steganography

KM Shenoy, SG Shaikh - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
In this paper, an approach to transfer data securely is proposed. First, from the sender side,
the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted …

Security and Privacy in smart Internet of Things environments for well-being in the healthcare industry

P Shah, S Pandya, G Srivastava, TR Gadekallu - 2022 - IET
Privacy protection is required when communicating data in the healthcare system. The
Internet of Things (IoT) in healthcare has numerous advantages, including the potential to …

Advanced Steganography: Key Pairing

P Singh, N Bansal, S Pandey, P Kumari - ICT Systems and Sustainability …, 2022 - Springer
Research for greater security of important data becomes more sophisticated day by day as
all information is processed only through online mode or travels through Internet medium …

Method and design of encrypted image hiding based on random LSB matching

F Yun - … Conference on Computer Network Security and …, 2024 - spiedigitallibrary.org
The Internet has provided great convenience for people, but at the same time, there have
also been some problems that infringe on people's interests. How to effectively protect …

[PDF][PDF] A Survey of Different Steganography Techniques

EA Elshazly, SAS Abdelwahab, RM Fikry… - Minufiya Journal of …, 2016 - researchgate.net
Steganography is defined as the art and science of embedding data in a cover object
without leaving a remarkable track on the cover object, in other words it is the study of …

[PDF][PDF] Peningkatan Least Significant Bit (LSB) pada Citra dengan Formasi 2-3-3 dan Bilangan Acak Linear Congruential Number Generator (LCG)

P Sirait, IA Pardosi - citisee.amikompurwokerto.ac.id
Steganografi merupakan seni dan ilmu untuk menyamarkan pesan dan termasuk teknik
yang kuat untuk menyisipkan pesan rahasia di dalam citra. Tedapat banyak metode …

[PDF][PDF] Digital Image Steganography System

HHM Ali - 2020 - sciences.uodiyala.edu.iq
Steganography is the art of science that is concerned with hiding communications by hiding
secret information inside a medium as a carrier, called cover medium, to be sent over …