Chaos based encryption technique for compressed h264/avc videos

MA El-Mowafy, SM Gharghory, MA Abo-Elsoud… - IEEE …, 2022 - ieeexplore.ieee.org
Saving videos streaming from the unlawful users became an urgent claim. Cryptography
and Steganography are the most important and indispensable processes to protect and …

[HTML][HTML] Large-capacity information hiding scheme based on minimum pixel modification

Z Yu, Z Ju, L Teng, W Sha, P Dongbo - Egyptian Informatics Journal, 2022 - Elsevier
Abstract Information hiding is an important technique for security-related applications, and it
can be used wildly in many scenarios. Secret data embedding methods are proposed in …

Improve steganography system using agents software based on statistical and classification technique

EHJ Halboos, AM Albakry - Bulletin of Electrical Engineering and …, 2023 - beei.org
In digital communications, information security is a paramount necessity. In the hiding
algorithm, there are three basic parameters: security, capacity, and imperceptibility …

Investigating the Effectiveness of Artificial Intelligence in Watermarking and Steganography for Digital Media Security

SMJ Abdalwahid, WA Hashim… - … Multi-Conference on …, 2024 - ieeexplore.ieee.org
Watermarking and Steganography are methods of embedding digital information within
images or other media, such as text or audio, for the purpose of Copyright Protection or …

[PDF][PDF] An image steganography using improved hyper-chaotic Henon map and fractal tromino

S Nagarajegowda, K Krishnan - International Journal of Electrical …, 2023 - academia.edu
Steganography is a vital security approach that hides any secret content within ordinary
data, such as multimedia. First, the cover image is converted into a wavelet environment …

[PDF][PDF] 'Secure steganographic data transmission method for periodically updated data

T Koroglu, R Samet - J. Modern Tech. Eng, 2022 - jomardpublishing.com
The main goal of the work in the field of steganography is to transmit data in a cover image
with minimal distortion. The proposed method aims to transmit periodically updated data in a …

Selection and Substantiation of the System of Criteria for Evaluating the Effectiveness of Steganographic Methods of Hiding Information in the Image

O Turovsky, O Tkachenko, GSN Ghno… - 2024 35th Conference …, 2024 - ieeexplore.ieee.org
Background: Safe and discreet information transmission is essential as communication
routes grow increasingly complex in the digital age. Steganography has been used to hide …

Compressive Embedding Method for Reversible Steganography Using XOR Approach

S Rathor, S Srivastava, A Raj, A Singh… - … Conference on Multi …, 2024 - Springer
The need to hide confidential data and the lack of reliable techniques led to the emergence
of steganography. This paper aims to bring a new and significant approach to reversible …

Enhancing Artwork Resilience Through Variable Embedding Technique

R Deepalakshmi, KR SenthilMurugan… - … on Emerging Trends …, 2024 - ieeexplore.ieee.org
In the rapidly evolving digital world, safeguarding creative works against unapproved
modifications has emerged as a critical issue. Because of the shortcomings of traditional …

[PDF][PDF] SECURE STEGANOGRAPHIC DATA TRANSMISSION METHOD FOR PERIODICALLY UPDATED DATA

R Samet, T Köroğlu - 2022 - gcris.pau.edu.tr
The main goal of the work in the field of steganography is to transmit data in a cover image
with minimal distortion. The proposed method aims to transmit periodically updated data in a …