An improved image steganography technique using edge based data hiding in DCT domain

N Ayub, A Selwal - Journal of Interdisciplinary Mathematics, 2020 - Taylor & Francis
Steganography is a type of secret communication which is used to hide the confidential
information from the intruder. The security during information communication is a key …

[HTML][HTML] An efficient image steganography approach over wireless communication system

AA Eyssa, FE Abdelsamie, AE Abdelnaiem - Wireless personal …, 2020 - Springer
This paper presents a robust color image steganography approach for image
communication over wireless communication systems. The objective of this approach is to …

An improved secure image hiding technique using PN-sequence based on DCT-OTP

MNM Najih, EH Rachmawanto, CA Sari… - 2017 1st International …, 2017 - ieeexplore.ieee.org
The security of sending confidential data on the internet is very important. Thus, the data
security techniques must be developed. Techniques like cryptography and steganography …

Combined cryptography and steganography for enhanced security in suboptimal images

SJ Gladwin, PL Gowthami - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Technology has developed to a very great extent, and the use of smart systems has
introduced an increasing threat to data security and privacy. Most of the applications are …

A DWT-DCT combined approach for video steganography

VV Korgaonkar, MN Gaonkar - 2017 2nd IEEE International …, 2017 - ieeexplore.ieee.org
Advancement in the use of internet network and growth of technology has led to increasing
in Steganography. Steganography is the way of carrying out secure communication without …

[PDF][PDF] High quality PVM based reversible data hiding method for digital images

P Maniriho, T Ahmad - … Journal of Innovative Computing, Information and …, 2019 - ijicic.org
In recent years, transmitting and sharing multimedia data across the Internet have raised up
many data security issues such as copyright and contents protection due to the …

A comparision between steganography software tools

H Arif, H Hajjdiab - … IEEE/ACIS 16th International Conference on …, 2017 - ieeexplore.ieee.org
The process of hiding data in a medium that is insignificant, ordinary and not a secret is
referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc …

Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks

R Prabhu, P Archana, S Anusooya… - The Scientific …, 2023 - scientifictemper.com
An internet of things (IoT) is an intelligent environment such as homes and smart cities of our
country, and IoT improves the new technology implementation for home automation. The …

Performance analysis of data hiding in thermal image using alpha blending technique

S Rathika, R Gayathri - Materials Today: Proceedings, 2021 - Elsevier
Hiding data in an image become a very successful technique to communicate with end
users, blinding the interpreter's intention. Various algorithms have been analyzed on the …

A data hiding approach using enhanced-RDE in grayscale images

P Maniriho, T Ahmad - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Nowadays, the internet has become a broad network enabling many enterprises around the
world to interact while sharing data. Nonetheless, this technology has brought many …