Steganography with pixel-value differencing and modulus function based on PSO

Z Li, Y He - Journal of information security and applications, 2018 - Elsevier
An effective steganographic scheme is proposed that combines pixel-value differencing,
modulus function, and particle swarm optimization on the basis of previous research. In this …

[PDF][PDF] A review on steganography techniques

WM Abduallah, AMS Rahma - American Scientific Research …, 2016 - researchgate.net
Steganography is the science of hiding a secret message in cover media, without any
perceptual distortion of the cover media. Using steganography, information can be hidden in …

[HTML][HTML] Block-based steganographic algorithm using modulus function and pixel-value differencing

AK Al-Dhamari, KA Darabkh - Journal of Software Engineering and …, 2017 - scirp.org
The main purpose in developing the steganographic algorithms lies in achieving most of the
steganographic objectives which comprise the embedding capacity, imperceptibility …

Text hiding in an image using least significant bit and ant colony optimization

AI Al-Hussein, MS Alfaras, TA Kadhim - Materials Today: Proceedings, 2023 - Elsevier
In today's technological world, one of the most challenging problems is information security.
In the past ten years, many methods were introduced for securing the secret data …

Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy

YT Chang, MH Wu, SJ Wang - … Second IFIP TC5/8 International Conference …, 2014 - Springer
This paper present a steganalysis method for the data hiding scheme based on VQ-
compression. This data hiding algorithm divides the codebook into groups which contain two …

[PDF][PDF] Efficient Image Steganography Approaches Based on Mix Column Transform Technique

WM Abduallah - 2015 - researchgate.net
Steganography is the science of hiding a message signal in a host signal, without any
perceptual distortion of the host signal. Using steganography, information can be hidden in …

Data Hiding within Color Images Based on MCT with X-OR Operations

WM Abduallah, AMS Rahma… - … on Advanced Computer …, 2013 - ieeexplore.ieee.org
In this paper, we present an efficient scheme of color image steganography based on Mix
Column Transform (MCT) on specified blocks selected according to secret key and hide the …

Analysis of Encoding Methods Contributing to the Payload of Steganography

HJ Luo, HC Xu, JH Sun - Advanced Materials Research, 2013 - Trans Tech Publ
In this paper, we compare Huffman coding and Arithmetic coding with ASCII coding to
observe their contribution to steganography. This way is to compress the embedded …