Digital image watermarking techniques: a review

M Begum, MS Uddin - Information, 2020 - mdpi.com
Digital image authentication is an extremely significant concern for the digital revolution, as it
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …

Deep Learning-Based Watermarking Techniques Challenges: A Review of Current and Future Trends

S Ben Jabra, M Ben Farah - Circuits, Systems, and Signal Processing, 2024 - Springer
The digital revolution places great emphasis on digital media watermarking due to the
increased vulnerability of multimedia content to unauthorized alterations. Recently, in the …

Refining image steganography distribution for higher security multimedia counting-based secret-sharing

T AlKhodaidi, A Gutub - Multimedia Tools and Applications, 2021 - Springer
Counting-based secret sharing is becoming a vital efficient multimedia technique for raising
the security of sensitive data especially when collective access to data are essential. Secret …

[HTML][HTML] Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3

AA Attaby, MFMM Ahmed, AK Alsammak - Ain Shams Engineering Journal, 2018 - Elsevier
Abstract Information security relies mainly upon encryption, and in some cases,
steganography for an extra layer of security. Steganography is the science and art of secret …

[PDF][PDF] A LSB based image steganography using random pixel and bit selection for high payload

UAME Ali, E Ali, M Sohrawordi… - International Journal of …, 2021 - researchgate.net
Security in digital communication is becoming more important as the number of systems is
connected to the internet day by day. It is necessary to protect secret message during …

[PDF][PDF] Image steganography based on swarm intelligence algorithms: A survey

DA Zebari, DQ Zeebaree, JN Saeed, NA Zebari… - people, 2020 - academia.edu
Abstract Information security and confidentiality are the prime concern of any type of
communication. The techniques that utilizing inconspicuous digital media such as text …

A survey on digital image steganography approaches

I Aqeel, MB Suleman - … , INTAP 2018, Bahawalpur, Pakistan, October 23 …, 2019 - Springer
Steganography is the science of secret communication. It assumes if message is visible then
it can be accessed. If it is invisible then it can never be in front of attack. So it hides the …

A modified hash based least significant bits algorithm for steganography

SD Muyco, AA Hernandez - … of the 4th International Conference on Big …, 2019 - dl.acm.org
New development in computer security has focused on security using only the cryptography
and steganography techniques as well, or the combination of both. In steganography, the …

[PDF][PDF] Information hiding using chaotic-address steganography

ON Kadhim, ZM Hussain - J. Comput. Sci, 2018 - repository.atu.edu.iq
In this study, two techniques are introduced for image steganography in the spatial domain.
These systems employ chaos theory to track the addresses of shuffled bits in …

[PDF][PDF] A NOVEL IMAGE STEGANOGRAPHIC SYSTEM BASED ON EXACT MATCHING ALGORITHM AND KEY-DEPENDENT DATA TECHNIQUE.

MA Alsarayreh, MA Alia, KA Maria - Journal of Theoretical & Applied …, 2017 - jatit.org
Steganography is defined as the art of hiding secret information. It is used to guarantee
information accessibility only by authorized parties. The least-significant bit (LSB) approach …