Application of integrated steganography and image compressing techniques for confidential information transmission

BK Pandey, D Pandey, S Wairya… - Cyber security and …, 2022 - Wiley Online Library
In the present day, images and videos account for nearly 80% of all the data transmitted
during our daily activities. This work employs a combination of novel stegnography and data …

Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography

S Pramanik, RP Singh, R Ghosh - Multimedia Tools and Applications, 2020 - Springer
The Internet is used for exchanging information. Sometimes it is required to transmit
confidential data over the internet. Here the authors use image steganography to embed …

[PDF][PDF] A secured image steganography using genetic algorithm

S Pramanik, SS Raja - Advances in Mathematics …, 2020 - research-publication.com
According to the optimization techniques examined in the past, the performance of Genetic
Algorithm (GA) based approaches are seen as a substandard technique compared to PSO …

A novel approach using steganography and cryptography in business intelligence

S Pramanik, R Ghosh, MM Ghonge… - … for Analytics, Business …, 2021 - igi-global.com
In the information technology community, communication is a vital issue. And image transfer
creates a major role in the communication of data through various insecure channels …

Steganography using improved LSB approach and asymmetric cryptography

S Pramanik, D Samanta, S Dutta… - … on advent trends in …, 2020 - ieeexplore.ieee.org
Steganography deals with the craft of obscuring private data inside a spread media. In
confidential data communication security is a vital issue. In this paper, we use a two-layer …

Signature image hiding in color image using steganography and cryptography based on digital signature concepts

S Pramanik, SK Bandyopadhyay… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
Data Transmission in network security is one of the most vital issues in today's
communication world. The outcome of the suggested method is outlined over here …

[PDF][PDF] Review on secured data capabilities of cryptography, steganography, and watermarking domain

FQA Al-Yousuf, R Din - Indonesian Journal of Electrical …, 2020 - researchgate.net
Due to the increment of using Internet to transfer the critical and secret data, many studies
interested in secured data and investigated many ways to secure the transferred information …

The Suggested Use of Big Data in Medical Analytics by Fortis Healthcare Hospital

V Veeraiah, KO Thejaswini, R Dilip, SK Jain… - Adoption and Use of …, 2024 - igi-global.com
The chapter describes how clinical data may be stored in digital formats, such as patient
reports, as electronic health records, and how meaningful information from these records …

Implementation and analysis of image steganography using Least Significant Bit and Discrete Wavelet Transform techniques

SS Yadahalli, S Rege… - 2020 5th international …, 2020 - ieeexplore.ieee.org
Steganography is classified among the foremost methods employed in data security to
conceal and safeguard confidential messages in the data transmitted. Security, especially …

Unseen to Seen by Digital Steganography: Modern-Day Data-Hiding Techniques

SK Bandyopadhyay, V Goyal, S Dutta… - … Approach to Modern …, 2021 - igi-global.com
In this digital era, most of the daily works of users are captured in digital forms like image,
audio, video, or even text. These may contain sensitive, confidential, or private information …