Graded fuzzy edge detection for imperceptibility optimization of image steganography

DRIM Setiadi, S Rustad, PN Andono… - The Imaging Science …, 2023 - Taylor & Francis
The edge area of an image is more resilient to distortion caused by embedding in
steganography, driving the advancement of edge detection-based methods. State-of-the-art …

Progressive Hartley image secret sharing for high-quality image recovery

RM Holla, D Suma - Cogent Engineering, 2023 - Taylor & Francis
This paper introduces a highly efficient approach for progressive image secret sharing
through the Discrete Hartley Transform (DHT), offering distinct advantages over existing …

Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text

D Raghuvanshi, K Joshi, R Nandal, H Sehrawat… - Multimedia Tools and …, 2024 - Springer
This paper addresses the underexplored landscape of chaotic functions in steganography,
existing literature when examined under PRISMA-ScR framework it was realized that most of …

[PDF][PDF] Crypto-steganographic model using chaos and coding based in deoxyribonucleic acid

EAL Torres, D Alvarado-Nieto… - International Journal of …, 2024 - academia.edu
Given the increase of information circulating through public channels, it is essential to create
robust schemes to ensure the security of such information. The results presented here were …

Hybrid Edge Detection Methods in Image Steganography for High Embedding Capacity

M Habiban, FR Hamade, NA Mohsin - Cybernetics and Information …, 2024 - sciendo.com
In this research, we propose two new image steganography techniques focusing on
increasing image-embedding capacity. The methods will encrypt and hide secret information …

Electronic Parts Counting in Physics Laboratory Using Difference of Gaussians Edge Extraction

T Leelawattananon… - 2024 12th International …, 2024 - ieeexplore.ieee.org
Small electronic parts counting in the physics laboratory is a challenging task. These small
objects such as resistors, capacitors, and inductors are used in physics laboratories and …

A Coverless Image Steganography Method Based on Feature Matrix Mapping

L Li, C Yang, J Chen - Chinese Conference on Image and Graphics …, 2023 - Springer
To address the challenge that the current coverless image steganography (CIS) method
requires more cover images and more information, a coverless image steganography …

Increasing the Efficiency of Blind Decoding of the Steganographic Method with Code Control of Additional Information Embedding

A Sokolov, O Ihnatenko, N Balandina - Problemele Energeticii Regionale, 2024 - ibn.idsi.md
Modern energy systems are often used as a medium for information transmission, including
confidential information, which makes relevant the task of ensuring its security, which today …

EDGE-Based Image Steganography

B Mondal, BR Dutta - International Conference on Computational …, 2023 - Springer
Steganography is a technique of hiding information in another data. In image
steganography, the secret message is embedded inside one digital image. The most …