Secure information embedding in images with hybrid firefly algorithm

S Nokhwal, M Chandrasekharan… - arXiv preprint arXiv …, 2023 - arxiv.org
Various methods have been proposed to secure access to sensitive information over time,
such as the many cryptographic methods in use to facilitate secure communications on the …

New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization

NN El-Emam - Computers & Security, 2015 - Elsevier
A new steganography algorithm based on five protection layers has been suggested in this
paper for embedding a large amount of secret messaging in a color image, as represented …

Computational intelligence for information security: A survey

R Wang, W Ji - IEEE Transactions on Emerging Topics in …, 2020 - ieeexplore.ieee.org
Information security is the set of processes that protect information away from unauthorized
access, disclosure, replication, modification, or destruction. Recently, more and more real …

Performance enhanced image steganography systems using transforms and optimization techniques

S Uma Maheswari, D Jude Hemanth - Multimedia Tools and Applications, 2017 - Springer
Image steganography is the art of hiding highly sensitive information onto the cover image.
An ideal approach to image steganography must satisfy two factors: high quality of stego …

An efficient data hiding scheme using firefly algorithm in spatial domain

A Amsaveni, C Arunkumar - 2015 2nd International Conference …, 2015 - ieeexplore.ieee.org
In recent times a lot of work has been carried out in the field of reversible data hiding (RDH)
to prevent the secret data from theft, illegal copying and unlawful reproduction. In RDH the …

A metaheuristic method to hide MP3 sound in JPEG image

A Gupta, A Chaudhary - Neural Computing and Applications, 2018 - Springer
VoIP is much in use these days as many applications over phone, tablet, and computers are
available. The data in VoIP can be collected for further analysis or it can be intercepted. VoIP …

[PDF][PDF] An efficient embedding technique in image steganography using lucas sequence

P Das, S Ray, A Das - International Journal of Image, Graphics and …, 2017 - academia.edu
Image steganography have been observed as one of the useful techniques to prevent
unintended users to understand what information has been communicated over the network …

Scope of support vector machine in steganography

R Tanwar, S Malhotrab - IOP Conference Series: Materials …, 2017 - iopscience.iop.org
Steganography is a technique used for secure transmission of data. Using audio as a cover
file opens path for many extra features. In order to overcome the limitations of conventional …

[PDF][PDF] Information Protection against Security Threats in an Insecure Environment using Cryptography and Steganography

ER Ozighor, I Izegbu - GSJ, 2020 - academia.edu
These days almost everyone is using Internet and its applications for communication and
transferring data from one point to the other to fulfill their day to day activities whether it is …

Covert communication using arithmetic division operation

A Fernandes, W Jeberson - Procedia Computer Science, 2015 - Elsevier
This digital era has seen a tremendous growth in technology and we find ourselves amidst
vast amounts of data that needs to be accessed and shared with people all over the World. A …