Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

[PDF][PDF] A review on security techniques in image steganography

S Ghoul, R Sulaiman, Z Shukur - International Journal of …, 2023 - researchgate.net
Given the increased popularity of the internet, the exchange of sensitive information leads to
concerns about privacy and security. Techniques such as steganography and cryptography …

A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques

IQ Abduljaleel, ZA Abduljabbar, MA Al Sibahee… - Journal of Sensor and …, 2022 - mdpi.com
Data security can involve embedding hidden images, text, audio, or video files within other
media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …

Algorithmic method of security of the Internet of Things based on steganographic coding

A Kabulov, I Saymanov, I Yarashov… - … IOT, Electronics and …, 2021 - ieeexplore.ieee.org
In the Internet of Things, it is more important than ever to effectively address the problem of
secure transmission based on steganographic substitution by synthesizing digital sensor …

Steganography using improved LSB approach and asymmetric cryptography

S Pramanik, D Samanta, S Dutta… - … on advent trends in …, 2020 - ieeexplore.ieee.org
Steganography deals with the craft of obscuring private data inside a spread media. In
confidential data communication security is a vital issue. In this paper, we use a two-layer …

[PDF][PDF] Dynamic steganography least significant bit with stretch on pixels neighborhood

MK Harahap, N Khairina - Journal of Information Systems …, 2020 - e-journal.unair.ac.id
Background: The confidentiality of a message may at times be compromised.
Steganography can hide such a message in certain media. Steganographic media such as …

An improved data hiding using pixel value difference method and hyperchaotic system

SA Fadhel, ZN Al-Kateeb… - Journal of Physics …, 2021 - iopscience.iop.org
The present paper builds a security system to encrypt and hide important text data. The
system utilized an AES method to conduct an encryption process, followed by hiding the …

Encryption and Steganography a secret data using circle shapes in colored images

ZN Al-Kateeb, MJ Al-Shamdeen… - Journal of Physics …, 2020 - iopscience.iop.org
Since the earliest times, people have used the encryption and hiding data to achieve a safe
and reliable transfer of important data. This paper propesed a new method for encrypting …

Variable bit allocation method based on meta-heuristic algorithms for facial image compression

R Khodadadi, G Ardeshir, H Grailu - Multimedia Systems, 2023 - Springer
High spatial resolution is one of the most important factors in increasing image quality, but it
increases the amount of storage memory. On the other hand, in the field of face image …

A high imperceptible data hiding technique using quorum function

PV Sabeen Govind, BM Varghese, MV Judy - Multimedia tools and …, 2021 - Springer
In today's digitalized age and generation, where there is need of secure storage and
transmission of data, the need of hiding information becomes a pre-requisite. In like …