Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

Secure 3d data hiding technique based on a mesh traversal algorithm

S Farrag, W Alexan - Multimedia Tools and Applications, 2020 - Springer
Due to its powerful ability to conceal secret data inside an unsuspicious cover object, image
steganography has emerged as an active field of research. Recently, a lot of advancements …

Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

[PDF][PDF] Image steganography in spatial domain: Current status, techniques, and trends.

AM Alhomoud - Intelligent Automation & Soft Computing, 2021 - cdn.techscience.cn
This research article provides an up-to-date review of spatial-domain steganography.
Maintaining the communication as secure as possible when transmitting secret data through …

Enhanced image security using stenography and cryptography

S Matted, G Shankar, BB Jain - Computer Networks and Inventive …, 2021 - Springer
In this age of information technology, the most vital part of information and communication
exchange is the Internet. With advances in information technology and the Internet, digital …

Performance analysis of various image steganography techniques

M Sahu, N Padhy, SS Gantayat… - … on Computer Science …, 2022 - ieeexplore.ieee.org
Information hiding is the most interesting and prominent field of data security. With the
evolution of computational infrastructure, covert communication techniques have received …

A two-level secure data hiding algorithm for video steganography

S Manisha, TS Sharmila - Multidimensional Systems and Signal …, 2019 - Springer
Sensitive data is exchanged frequently through wired or wireless communication that are
vulnerable to unauthorized interception. Cryptography is a solution to overcome this issue …

[PDF][PDF] A survey on digital image steganography

J Wang, M Cheng, P Wu, B Chen - Journal of Information Hiding …, 2019 - cdn.techscience.cn
Internet brings us not only the convenience of communication but also some security risks,
such as intercepting information and stealing information. Therefore, some important …