AISM: An Adaptable Image Steganography Model with User Customization

B Guo, P Ping, S Zhou, OT Bloh, F Xu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In the field of image steganography, quality, security, and capacity emerge as three crucial
aspects for ensuring the security of images stored on cloud servers. However, many existing …

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

R Ch, V Yadlapalli, SS Sk, GT Reddy… - CAAI Transactions on …, 2024 - Wiley Online Library
Data is the key element that runs the modern society. Large amounts of data are being
released day by day as a result of many activities. The digital data is transferred through the …

Reversible Image Steganography to Achieve Effective PSNR

MG Nayab, AP Singh, R Sharma, G Raj - International Conference on …, 2023 - Springer
Image Steganography is one of the most well-known methods where a top-secret data is
embedded into the pixels of an image by altering some of its pixel values. Reversible Image …

High capacity double precision image steganography based on chaotic maps

SF Al Rubaie, MKM Al-Azawi - Bulletin of Electrical Engineering and …, 2024 - beei.org
Steganography is the process of hiding confidential information within non-secret
multimedia such that the 3 rd party cannot distinguish if there is a secret message in it or not …

High Security and Robustness Image Steganography Based On Ant Colony Optimization Algorithms and Discrete Cosine Transform

AS Ahmed, HA Salah - Journal of Education for Pure Science …, 2023 - jceps.utq.edu.iq
Journalof Educationfor Pure Science- University of Thi-Qar High Security and Robustness
Image Steganography Based On Ant Colony Page 1 Journalof Educationfor Pure Science …

A Low-Distortion Reversible Steganography Method that Conceals Data in Images with Minimal Distortion

MG Nayab, AP Singh, R Sharma, G Raj - International Conference on …, 2023 - Springer
Image steganography is one of the most well-known methods where a top-secret data is
embedded into the pixels of an image by altering some of its pixel values. Reversible image …

DH-AES Cryptographic Scheme for Securing Medical IoT Devices

V Gandam, J Madiapalli, N Lenkewar… - … Algorithms and Soft …, 2023 - ieeexplore.ieee.org
Ensuring the security of data obtained from medical devices is paramount for efficient and
safe utilization. Cryptographic methods remain pivotal in establishing a protective …