Performance analysis of medical image security using steganography based on fuzzy logic

T Yuvaraja, RS Sabeenian - Cluster Computing, 2019 - Springer
The security level of the medical images in hospitals and scan centers are increased by
steganography technique, which imposes the secret image into cover image in order to …

Digital forensic enabled image authentication using least significant bit (lsb) with tamper localization based hash function

UK Das, SG Samaddar, PK Keserwani - Intelligent Communication and …, 2018 - Springer
Addition of hash component in a message is always for verification of authentication of
message without integrity. In order to retain integrity certain schemes such as Merkle …

A novel approach for image steganography based on LSB technique

GG Rajput, R Chavan - Proceedings of the International Conference on …, 2017 - dl.acm.org
Steganography involves communicating secret data in an appropriate digital carrier, eg,
image, audio, and video files. We focus on image based steganography in this paper. A …

DNA based steganography using 2-3-3 technique

RB Sushma, MV Namitha, GR Manjula… - … Conference on Data …, 2019 - ieeexplore.ieee.org
Digital communication is the new booming trend in modern world. Internet is in the fingertips
of everyone. With the encouragement given by government of India and more usage of cell …

Improved message payload and security of image steganography using 3-3-2 LSB and dual encryption

PA Shofro, K Widia, DDAP Astuti… - … on Research of …, 2018 - ieeexplore.ieee.org
This research proposed a steganography technique on RGB true color image using LSB 3-3-
2 method. LSB 3-3-2 is a message embedding technique on 3 Least Significant Bit (LSB) on …

Performance analysis of LSB color image steganography based on embedding pattern of the rgb channels

B Sugiarto, CA Sari, IMS De Rosal… - … on Application for …, 2020 - ieeexplore.ieee.org
This research aims to analyze three patterns of embedding messages based on the Least
Significant Bit (LSB) method on RGB color images. Previous research has suggested a …

[PDF][PDF] Hiding (1-8) Multimedia Files In One Color Image

JN Shehab, HR Hatem, OA Mahmood - 2017 - iasj.net
This paper presents hiding one to eight gray images or texts (secret information) inside color
image (cover image) based on Least Significant Bits (LSB) algorithm. The main idea is to …

User data privacy in multimedia domain using 3–3 LSB-based color image steganography with RC4 and Bernoulli map protection

VK Trivedi, S Stalin, S Joshi… - Journal of …, 2022 - spiedigitallibrary.org
Social media sites such as Facebook, Twitter, etc. have become commonplace in everyday
life. With the emergence of the internet, the amount of data being created and communicated …

Tamper detection and recovery on RGB images

HB Macit, A Koyun - Artificial Intelligence and Applied Mathematics in …, 2020 - Springer
Special devices are required to perform tampering on an analogue image. This requires a
serious cost and skill. But it is easy to tamper on a digital image. Digital images can be …

Steganography Method of the Bigger Size in WebP Image Using M2PAM Algorithm for Social Applications

OA Najm, AS Nori - Turkish Journal of Computer and Mathematics …, 2022 - turcomat.org
Many facets of our lives, including business, education, and social activities, have been
dominated by social media. Users of social media exchange a tremendous amount of …