An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer

R Tanwar, K Singh, M Zamani… - Journal of computer …, 2019 - Wiley Online Library
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …

An analysis of 3D steganography techniques

R Tanwar, U Pilania, M Zamani, AA Manaf - Electronics, 2021 - mdpi.com
Steganography has become a preferred technique these days to successfully hide secret
messages. Various research has been done in the past to justify and analyze suitable types …

Comparison of Data Hiding Techniques for Video Watermarking Applications

F Arab, M Zamani, S Karamizadeh… - … on Computer and …, 2022 - ieeexplore.ieee.org
The basic idea for video watermarking technique is concealing information in the video host.
There are three popular techniques that can be used for data hiding those are …

A framework to evaluate the performance of video watermarking techniques

F Arab, M Zamani, S Poger… - 2019 IEEE 2nd …, 2019 - ieeexplore.ieee.org
This paper focuses on the current challenging problems of video watermarking techniques,
especially the robustness of spatial domain. This paper starts with background of the …

VW16E: a robust video watermarking technique using simulated blocks

F Arab, M Zamani - … Forensics and Security: Foundations, Innovations, and …, 2017 - Springer
The basic idea for video watermarking technique is concealing information in the video host
for different purposes including authentication and tamper detection. The most common …

Video watermarking schemes resistance against tampering attacks

F Arab, M Zamani - 2021 International Conference on Electrical …, 2021 - ieeexplore.ieee.org
This paper reviews the video watermarking schemes resistance against tampering attacks.
There are several transform methods which are used for Video Watermarking including …

[PDF][PDF] An Analysis of 3D Steganography Techniques. Electronics 2021, 10, 2357

R Tanwar, U Pilania, M Zamani, AA Manaf - 2021 - academia.edu
Steganography has become a preferred technique these days to successfully hide secret
messages. Various research has been done in the past to justify and analyze suitable types …

[PDF][PDF] Research Article An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact …

R Tanwar, K Singh, M Zamani, A Verma, P Kumar - 2019 - academia.edu
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …