Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography

AA Abdulla - 2015 - bear.buckingham.ac.uk
The rapid advancements in digital communication technology and huge increase in
computer power have generated an exponential growth in the use of the Internet for various …

Data hiding technique in steganography for information security using number theory

A Rehman, T Saba, T Mahmood… - Journal of …, 2019 - journals.sagepub.com
In the current era, due to the widespread availability of the Internet, it is extremely easy for
people to communicate and share multimedia contents with each other. However, at the …

Stego quality enhancement by message size reduction and fibonacci bit-plane mapping

AA Abdulla, H Sellahewa, SA Jassim - Security Standardisation Research …, 2014 - Springer
An efficient 2-step steganography technique is proposed to enhance stego image quality
and secret message un-detectability. The first step is a pre-processing algorithm that …

Efficient high-capacity steganography technique

AA Abdulla, SA Jassim… - Mobile Multimedia/Image …, 2013 - spiedigitallibrary.org
Performance indicators characterizing modern steganographic techniques include capacity
(ie the quantity of data that can be hidden in the cover medium), stego quality (ie artifacts …

Data hiding in virtual bit-plane using efficient Lucas number sequences

B Datta, K Dutta, S Roy - Multimedia Tools and Applications, 2020 - Springer
This paper introduces a steganography technique using the concept of virtual bit-plane.
Purposely another number system has been used in this technique instead of binary to hide …

[PDF][PDF] Steganography Technique for Binary Text Image

ZAS Rasheed - International Journal of Science and Research …, 2015 - researchgate.net
In last decades different techniques have been created for hiding information. The role of
hiding information is to create a secure communication between authorize parties in terms of …

[PDF][PDF] A Proposed Method for Image Steganography

SK Bandyopadhyay - Research in Medical & Engineering Science …, 2018 - academia.edu
All security techniques try to maintain Confidentiality, Integrity and Availability-referred to as
the CIA Triad of information security. Steganography also takes a real challenge in the field …

Efficient High Capacity Steganography Technique

AA Abdulla, SA Jassim, H Sellahewa - arXiv preprint arXiv:2004.11984, 2020 - arxiv.org
Performance indicators characterizing modern steganographic techniques include capacity
(ie the quantity of data that can be hidden in the cover medium), stego quality (ie artifacts …

Fountain code based AL-FEC for multicast services in MANETs

E Mammi, V Palma, A Neri… - 2011 Wireless …, 2011 - ieeexplore.ieee.org
In this paper the reliability of a real-time service for multicast transmission over lossy Mobile
Ad-hoc NETwork (MANET) is addressed. The proposed system combines application layer …

Data Hiding Techniques using number decompositions

R Borgohain - arXiv preprint arXiv:1206.4155, 2012 - arxiv.org
Data hiding is the art of embedding data into digital media in a way such that the existence
of data remains concealed from everyone except the intended recipient. In this paper, we …