Comparison of Least Significant Bit, Pixel Value Differencing, and Modulus Function on Steganography to Measure Image Quality, Storage Capacity, and Robustness

D Darwis, NB Pamungkas - Journal of Physics: Conference …, 2021 - iopscience.iop.org
Abstract Information security is an important aspect of information. The importance of the
value of information in every aspect can result in attempts to transfer access or theft of data …

A New Approach of Steganography Using Center Sequential Technique

D Darwis, A Junaidi - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
The quality of steganographic images can be determined from several aspects. One of the
testing techniques on steganography is cropping which is part of robustness testing. Under …

A secured steganography algorithm for hiding an image in an image

NG Kini, VG Kini, Gautam - Integrated intelligent computing …, 2019 - Springer
Recent developments in computer security have shown that steganography rather than
cryptography is the better method of securing data. A commonly used technique in …

Performance analysis of medical image security using steganography based on fuzzy logic

T Yuvaraja, RS Sabeenian - Cluster Computing, 2019 - Springer
The security level of the medical images in hospitals and scan centers are increased by
steganography technique, which imposes the secret image into cover image in order to …

A parallel algorithm to hide an image in an image for secured steganography

NG Kini, Gautam, VG Kini - Integrated intelligent computing …, 2019 - Springer
Recent developments in computer security have shown that compared to cryptography,
steganography is a better way of securing messages. With the advantages offered by …

[PDF][PDF] Digital data protection using steganography

R Rejani, D Murugan, DV Krishnan - ICTACT J. Commun. Technol, 2016 - ictactjournals.in
In today's digital world applications from a computer or a mobile device consistently used to
get every kind of work done for professional as well as entertainment purpose. However …

[PDF][PDF] Dual tree complex wavelet transform-based image security using steganography

T Yuvaraja, RS Sabeenian - Applied Mathematics & …, 2019 - naturalspublishing.com
Modern communication media requires high level of protection system for securing the
multimedia data from hackers. The most important objective of this manuscript is to develop …

Quantum-Based Colour Image Steganography

RS Randhawa, AR Hasabnis… - 2023 10th IEEE Uttar …, 2023 - ieeexplore.ieee.org
This research delves into the realm of quantum steganography, where the concealment and
encoding of secret messages within colored images are achieved through the ingenious …

Image encryption techniques for data transmission in networks: a survey

R Jayanthi, KJ Singh - International Journal of Advanced …, 2019 - inderscienceonline.com
Recently, there is a need to concentrate more on protecting the information that is stored in
computers from attackers due to the rapid growth of internet users. In this scenario, the …

[PDF][PDF] Digital Rights Management of Images Using Quadrinacci Sequence and LSB Embedding

M Gamal - 2023 - researchgate.net
As the use of technology escalates, so does the volume of data generated; hence, protecting
data transfer between communication parties has become a necessity. The main …