A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

Combination of steganography and cryptography: A short survey

MS Taha, MS Mohd Rahim, SA Lafta… - IOP conference …, 2019 - iopscience.iop.org
The establishment of a secure communication between two communicating parties is
becoming a difficult problem due to the likelihood of attacks and other unintentional changes …

[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …

A Proficient and secure way of Transmission using Cryptography and Steganography

GD Reddy, YVU Kiran, P Singh… - 2022 2nd …, 2022 - ieeexplore.ieee.org
People are concerned about the security of their data over the internet. The data can be
protected in many ways to keep unauthorized individuals from accessing it. To secure data …

Quantum image steganography schemes for data hiding: A survey

N Min-Allah, N Nagy, M Aljabri, M Alkharraa… - Applied Sciences, 2022 - mdpi.com
Quantum steganography plays a critical role in embedding confidential data into carrier
messages using quantum computing schemes. The quantum variant of steganography …

Video steganography using knight tour algorithm and LSB method for encrypted data

ZS Younus, GT Younus - Journal of Intelligent Systems, 2019 - degruyter.com
This paper aims to propose a method for data hiding in video by utilizing the least significant
bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the …

[PDF][PDF] A review of various steganography techniques in cloud computing

WA Awadh, AS Hashim, A Hamoud - University of Thi-Qar Journal of Science, 2019 - iasj.net
One of the latest trends in IT sector is cloud computing. It develops the capabilities of
organizations dynamically without training new employees, obtaining new software licenses …

Securing medical data transmission systems based on integrating algorithm of encryption and steganography

MM Hashim, MS Taha, AHM Aman… - 2019 7th …, 2019 - ieeexplore.ieee.org
The awareness to secure medical data has significantly increased. Steganographic has
binged an important topic especially in this area since it has the capability to avoid medical …

Based on iot healthcare application for medical data authentication: Towards a new secure framework using steganography

MM Hashim, SH Rhaif, AA Abdulrazzaq… - IOP Conference …, 2020 - iopscience.iop.org
With increasing transmission of sensitive information over the dispersed IoTs, security of
sensitive patient's contents is becoming more challenging and has been enthusiastic area of …

Improvement of image steganography scheme based on LSB value with two control random parameters and multi-level encryption

MH Mahdi, AA Abdulrazzaq, MSM Rahim… - IOP Conference …, 2019 - iopscience.iop.org
Recently, steganography has played an important part in the field of communication,
especially in image steganography. The major points of image steganography are the image …