Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

Optimized multimedia data through computationally intelligent algorithms

N Sharma, C Chakraborty, R Kumar - Multimedia Systems, 2023 - Springer
In the field of data exchange, the security of information is the critical aspect. This void in the
security helped the evolution of steganography to address the problem of security …

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …

A novel image steganographic method based on integer wavelet transformation and particle swarm optimization

PK Muhuri, Z Ashraf, S Goel - Applied Soft Computing, 2020 - Elsevier
Image steganography is a technique of hiding secret data into a cover image and so as to
prevent the intruders from accessing the secret data. The efficiency of image steganography …

Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage

P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …

[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021 - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …

Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography

S Pramanik, RP Singh, R Ghosh - Multimedia Tools and Applications, 2020 - Springer
The Internet is used for exchanging information. Sometimes it is required to transmit
confidential data over the internet. Here the authors use image steganography to embed …

Embau: A novel technique to embed audio data using shuffled frog leaping algorithm

S Nokhwal, S Pahune, A Chaudhary - Proceedings of the 2023 7th …, 2023 - dl.acm.org
The aim of steganographic algorithms is to identify the appropriate pixel positions in the host
or cover image, where bits of sensitive information can be concealed for data encryption …

Refining image steganography distribution for higher security multimedia counting-based secret-sharing

T AlKhodaidi, A Gutub - Multimedia Tools and Applications, 2021 - Springer
Counting-based secret sharing is becoming a vital efficient multimedia technique for raising
the security of sensitive data especially when collective access to data are essential. Secret …

Adaptive image steganography based on transform domain via genetic algorithm

A Miri, K Faez - Optik, 2017 - Elsevier
This paper presents a novel approach for data hiding in frequency domain with the use of
genetic algorithm. At first, cover images are mapped to a proper frequency domain using the …