[PDF][PDF] Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region.

S Khan, T Bianchi - International Journal of Electrical & Computer …, 2018 - core.ac.uk
This paper presents data an Ant colony optimization (ACO) based data hiding technique.
ACO is used to detect complex region of cover image and afterward, least significant bits …

Steganography using improved LSB approach and asymmetric cryptography

S Pramanik, D Samanta, S Dutta… - … on advent trends in …, 2020 - ieeexplore.ieee.org
Steganography deals with the craft of obscuring private data inside a spread media. In
confidential data communication security is a vital issue. In this paper, we use a two-layer …

[PDF][PDF] A new encrypted method in image steganography

S Pramanik, RP Singh, R Ghosh - Indonesian Journal of Electrical …, 2019 - researchgate.net
Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a
cover image using image steganography. CAPTCHA are the crazy codes. They are used in …

[PDF][PDF] Text in Image Hiding using Developed LSB and Random Method.

EA Abbood, RM Neamah… - … of Electrical & …, 2018 - download.garuda.kemdikbud.go.id
Information Hiding is a task that face difficult challenges in current time. The reason for these
challenges is the rapid development of methods of detection of hidden information. So …

[PDF][PDF] H-rotation: secure storage and retrieval of passphrases on the authentication process

H Touil, N El Akkad, K Satori - Int. J. Saf. Secur. Eng, 2020 - academia.edu
Accepted: 3 December 2020 Passwords/passphrases can be either system generated or
user-selected. A combination of both approaches is also possible—encryption created by …

Color image steganography in YCbCr space

ZA Alwan, HM Farhan… - International Journal of …, 2020 - search.proquest.com
Steganography is a best method for in secret communicating information during the
transference of data. Images are an appropriate method that used in steganography can be …

A Unique Way to Generate Password at Random Basis and Sending it Using a New Steganography Technique

S Pramanik, RP Singh, R Ghosh… - … Journal of Electrical …, 2020 - section.iaesonline.com
Data hiding is a technique for secure transmission of confidential data. Many data hiding
techniques exist and steganography is the most important one. This paper presents a new …

File encryption and hiding application based on advanced encryption standard (AES) and append insertion steganography method

GC Prasetyadi, AB Mutiara… - 2017 Second International …, 2017 - ieeexplore.ieee.org
Steganography is a method of hiding secret message in other innocuous looking object so
that its presence is not revealed. In this paper, a message, which is a computer file of any …

File encryption and hiding application based on AES and append insertion steganography

GC Prasetyadi, R Refianti… - … Electronics and Control), 2018 - telkomnika.uad.ac.id
Steganography is a method of hiding secret message in other innocuous looking object so
that its presence is not revealed. In this paper, a message, which is a computer file of any …

[PDF][PDF] Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced difference Expansion.

M Ntahobari, T Ahmad - … of Electrical & Computer Engineering (2088 …, 2018 - academia.edu
In this era of internet development, security of information sharing is the main problem faced
by human being. Data hiding technique is one of the solutions. However, hiding credential …