A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information

SA El_Rahman - Computers & Electrical Engineering, 2018 - Elsevier
Steganography is the practice of concealing the communication existence by hiding the
traveled message in cover media. This paper aims to study Discrete Cosine Transform …

An optimal and efficient data security technique through crypto-stegano for E-commerce

D Kumbhakar, K Sanyal, S Karforma - Multimedia Tools and Applications, 2023 - Springer
E-Commerce or Electronic commerce is the buying and selling of goods and services in
which any commercial transactions through wireless electronic devices such as hand-held …

Impact of various image formats supported by android smartphones on image steganography: a preliminary study

D Watni, S Chawla - Multimedia Tools and Applications, 2024 - Springer
Security of the information stored in android-based smartphones is a hot research topic.
Image steganography can be employed to increase the security of the confidential data …

[PDF][PDF] A Comparative Study on Steganography Digital Images: A Case Study of Scalable Vector Graphics (SVG) and Portable Network Graphics (PNG) Images …

A Almutairi - … Journal of Advanced Computer Science and …, 2018 - pdfs.semanticscholar.org
Today image steganography plays a key role for exchanging a secret data through the
internet. However, the optimal choice of images formats for processing steganography is still …

A modulo function-based robust asymmetric variable data hiding using DCT

S Khan, K Khan, A Arif, M Hassaballah, J Ali, QTH Ta… - Symmetry, 2020 - mdpi.com
This work presents a new asymmetric data hiding technique that hides a variable number of
secret message bits in the discrete cosine transform (DCT) coefficients of a cover image …

Cryptographically strong SP boxes and their application in steganography

D Shah, T Shah, Y Naseer, SS Jamal… - Journal of Information …, 2022 - Elsevier
For the security of digital data, different cryptosystems have been proposed in recent years.
The substitution boxes are used to generate confusion in the cryptosystems for hiding the …

Text steganography approaches using similarity of English font styles

SA El Rahman - International Journal of Software Innovation (IJSI), 2019 - igi-global.com
Data protection has become a more critical issue and the necessity to secure a transmission
channel is become more serious. Therefore, steganography, the art of hidden data into a …

A roadmap of steganography tools: conventional to modern

U Pilania, R Tanwar, P Gupta, T Choudhury - Spatial Information Research, 2021 - Springer
Steganography emerged as an effective technology for securing the data over the network.
Its specificity of concealing the existence of the secret data supports its application in …

[PDF][PDF] Performance Analysis of Open-Source Image Steganography Tools

U Pilania, R Tanwar, P Gupta - Journal of Engineering and Applied …, 2021 - m.mu.edu.sa
In the present epoch, where technology is rising fast with new developments, the main
challenge for the sender is to ensure that information is sent in a correct and covert mode …

[PDF][PDF] Transmitting security enforcement by text encrypting and image hiding technique using combined encrypt/hide keys

MJ Khami - IJEM, 2018 - mecs-press.org
Comparative study of cryptography and steganography techniques shows that they have
some strong and weak points when they used alone. But as we know from soft computing …