Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization

DD Shankar, AS Azhakath - Scientific Reports, 2023 - nature.com
The evolvement in digital media and information technology over the past decades have
purveyed the internet to be an effectual medium for the exchange of data and …

Hiding Information in Digital Images Using Ant Algorithms

M Boryczka, G Kazana - Entropy, 2023 - mdpi.com
Stenographic methods are closely related to the security and confidentiality of
communications, which have always been essential domains of human life. Steganography …

[HTML][HTML] Optimized steganography techniques based on PVDS and genetic algorithm

A Fahim, Y Raslan - Alexandria Engineering Journal, 2023 - Elsevier
Due to the rapid development of confidential digital communication over international
networks, security is the most significant factor. Steganography is the science of concealed …

[PDF][PDF] A new approach for Steganography: Bit shifting operation of encrypted data in LSB (SED-LSB)

S Solak, U ALTINIŞIK - Bilişim Teknolojileri Dergisi, 2019 - dergipark.org.tr
In this article, a new method is presented by adding bit shift of encrypted data in LSB method
(SED-LSB). The message to be embedded in the cover image is encrypted by the key …

Image Steganography-Based GUI Design to Hide Agricultural Data

S Solak, U Altınışık - Gazi University Journal of Science, 2021 - dergipark.org.tr
Throughout the ages, safely preserving and transmitting data that have extraordinary
importance for humanity has increased its importance with rapid advances in computer …

GÖRÜNTÜ STEGANOGRAFİSİNDE YAYGIN KULLANILAN VERİ GİZLEME TEKNİKLERİNİN İNCELENMESİ

M Uzun, S Solak - Mühendislik Bilimleri ve Tasarım Dergisi, 2022 - dergipark.org.tr
Steganography is one of the methods used to ensure data security in digital data
transmission. The aim of the steganography technique is to transmit data securely over the …

[PDF][PDF] The least significant two-bit substitution algorithm for image steganography

S Solak, U Altınışık - International Journal of Computer (IJC), 2018 - academia.edu
Steganography hides various data within different file types, which ensures secure
communication. In recent years, the science of steganography has gained importance, due …

PERBANDINGAN DAN KOMBINASI KINERJA ALGORITMA LEAST SIGNIFICANT BIT DENGAN PIXEL VALUE DIFFERENCING PADA STEGANOGRAFI CITRA …

IUW Mulyono, Y Kusumawati… - PROSIDING …, 2022 - ejournal.akprind.ac.id
One of the most common problems in this digitalization era is data security issues, such as
being compromised by digital data. Actually, there are many ways to protect digital data, one …

[PDF][PDF] NEW IMAGE STEGANOGRAPHY USING PURE AND SECRET-KEY PATTERNS BASED ON DISTANCE IN SPATIAL DOMAIN

RA Dihin, NR Hamza, HT Rashid - researchgate.net
Steganography is a technique for concealing secret messages from persons who are not
authorized to see them. These days, data security during travel is critical. Using the spatial …

Image Steganography's Challenges, Risks and Inferences in Spatial Domain.

KS Suresh, T Kamalakannan - Turkish Online Journal of …, 2021 - search.ebscohost.com
Steganography has found its value for a long time in digital transformation/communications.
Cryptography is the oldest method to convert a plain text into cipher text. Steganography is …