A detailed review based on secure data transmission using cryptography and steganography

F Varghese, P Sasikala - Wireless Personal Communications, 2023 - Springer
During the last few decades, digital communication has played a vital role in various sectors
such as healthcare departments, banking, information technology companies, industries …

Compressed and raw video steganography techniques: a comprehensive survey and analysis

RJ Mstafa, KM Elleithy - Multimedia Tools and Applications, 2017 - Springer
In the last two decades, the science of covertly concealing and communicating data has
acquired tremendous significance due to the technological advancement in communication …

[HTML][HTML] DSTATCOM allocation in distribution networks considering load variations using bat algorithm

T Yuvaraj, K Ravi, KR Devabalaji - Ain Shams Engineering Journal, 2017 - Elsevier
This paper proposes a new method of scheduling for optimal placement and sizing of
Distribution STATic COMpensator in the radial distribution networks to minimize the power …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …

A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

K Muhammad, M Sajjad, I Mehmood, S Rho… - Multimedia Tools and …, 2016 - Springer
Image Steganography is a thriving research area of information security where secret data is
embedded in images to hide its existence while getting the minimum possible statistical …

[PDF][PDF] Pixel indicator technique for RGB image steganography

AAA Gutub - Journal of emerging technologies in web intelligence, 2010 - academia.edu
Image based steganography utilize the images as cover media to hide secret data. The
common technique used in this field replaces the least significant bits (LSB) of image pixels …

[HTML][HTML] Information hiding scheme for digital images using difference expansion and modulus function

P Maniriho, T Ahmad - Journal of king saud university-computer and …, 2019 - Elsevier
Disguising the presence of communication has become a severe concern in this highly
digitalized world due to the unauthorized data access and network policy violations that are …

A secure image watermarking for tamper detection and localization

S Bhalerao, IA Ansari, A Kumar - Journal of Ambient Intelligence and …, 2021 - Springer
Data security has become a major concern of present time. Digital image watermarking is
seen as a viable solution to ensure the integrity of image data. Watermarking algorithms can …

RGB intensity based variable-bits image steganography

MT Parvez, AAA Gutub - 2008 IEEE Asia-Pacific Services …, 2008 - ieeexplore.ieee.org
In this paper, we present a new algorithm for RGB image based steganography. Our
algorithm introduces the concept of storing variable number of bits in each channel (R, G or …

[PDF][PDF] An improved LSB based steganography technique for RGB color images

M Juneja, PS Sandhu - International journal of computer and …, 2013 - ijcce.org
Significant bit) based Steganography technique for images imparting better information
security. It presents an embedding algorithm for hiding encrypted messages in nonadjacent …