In the last two decades, the science of covertly concealing and communicating data has acquired tremendous significance due to the technological advancement in communication …
This paper proposes a new method of scheduling for optimal placement and sizing of Distribution STATic COMpensator in the radial distribution networks to minimize the power …
A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for multi-user authentication systems. This work focus on improving the counting-based secret …
Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical …
AAA Gutub - Journal of emerging technologies in web intelligence, 2010 - academia.edu
Image based steganography utilize the images as cover media to hide secret data. The common technique used in this field replaces the least significant bits (LSB) of image pixels …
P Maniriho, T Ahmad - Journal of king saud university-computer and …, 2019 - Elsevier
Disguising the presence of communication has become a severe concern in this highly digitalized world due to the unauthorized data access and network policy violations that are …
Data security has become a major concern of present time. Digital image watermarking is seen as a viable solution to ensure the integrity of image data. Watermarking algorithms can …
In this paper, we present a new algorithm for RGB image based steganography. Our algorithm introduces the concept of storing variable number of bits in each channel (R, G or …
M Juneja, PS Sandhu - International journal of computer and …, 2013 - ijcce.org
Significant bit) based Steganography technique for images imparting better information security. It presents an embedding algorithm for hiding encrypted messages in nonadjacent …