[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

[HTML][HTML] Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

[HTML][HTML] Dual-domain image encryption in unsecure medium—a secure communication perspective

H Mahalingam, T Veeramalai, AR Menon… - Mathematics, 2023 - mdpi.com
With the growing demand for digitalization, multimedia data transmission through wireless
networks has become more prominent. These multimedia data include text, images, audio …

Local binary pattern‐based reversible data hiding

M Sahu, N Padhy, SS Gantayat… - CAAI Transactions on …, 2022 - Wiley Online Library
A novel local binary pattern‐based reversible data hiding (LBP‐RDH) technique has been
suggested to maintain a fair symmetry between the perceptual transparency and hiding …

An optimal information hiding approach based on pixel value differencing and modulus function

AK Sahu, G Swain - Wireless Personal Communications, 2019 - Springer
This paper proposes an image steganography approach based on pixel value differencing
and modulus function (PVDMF) to improve the peak signal-to-noise ratio (PSNR) and hiding …

Very high capacity image steganography technique using quotient value differencing and LSB substitution

G Swain - Arabian Journal for Science and Engineering, 2019 - Springer
This article proposes a very high capacity steganography technique using differencing and
substitution mechanisms. It divides the image into non-overlapped 3 * 3 3× 3 pixel blocks …

Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP

AK Sahu, G Swain, M Sahu, J Hemalatha - Journal of Information Security …, 2021 - Elsevier
Since the inception of pixel value differencing (PVD) image steganography, it has drawn
considerable interest among the researchers of this field. However, most of the PVD based …

FPGA image encryption-steganography using a novel chaotic system with line equilibria

S Jing-yu, C Hong, W Gang, G Zi-bo, H Zhang - Digital Signal Processing, 2023 - Elsevier
The wide dissemination of images makes its protection problems urgent. Chaos theory is
widely applied since it provides better solutions to image protection. This paper introduces a …

A novel n-rightmost bit replacement image steganography technique

AK Sahu, G Swain - 3D Research, 2019 - Springer
Image steganography is a technique for hiding the secret data in a carrier image. This paper
proposes a novel n-right most bit replacement image steganography technique to hide the …

Enhanced adaptive data hiding method using LSB and pixel value differencing

M Hussain, Q Riaz, S Saleem, A Ghafoor… - Multimedia Tools and …, 2021 - Springer
High embedding capacity is considered as one of the significant challenges in information
hiding. In the spatial domain, most of the high capacity based strategies employed the least …