Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

[PDF][PDF] An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection

J Jumanto - Cybernetics and information technologies, 2018 - sciendo.com
The Internet is a public network with many issues of data transfer security. Steganography is
a data transmission security technique that is done by hiding the message in a container …

Secure text extraction from complex degraded images by applying steganography and deep learning

BK Pandey, D Mane, VKK Nassa, D Pandey… - … approach to modern …, 2021 - igi-global.com
This work's primary goal is to secure the transmission of text hidden within the cover image
using steganography over a public network of computers. Steganography is a powerful tool …

New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check

M Cem kasapbaşi, W Elmasry - Sādhanā, 2018 - Springer
Steganography is the technique for hiding information within a carrier file so that it is
imperceptible for unauthorized parties. In this study, it is intended to combine many …

[PDF][PDF] FPGA implementation of robust image steganography technique based on least significant bit (LSB) in spatial domain

EA Elshazly, SAS Abdelwahab, RM Fikry… - … Journal of Computer …, 2016 - researchgate.net
There are many different data hiding techniques, the Least Significant Bit (LSB) based
steganography algorithm is considered as one of the most popular algorithms in the spatial …

A modified high frequency adaptive security approach using steganography for region selection based on threshold value

S Mungmode, RR Sedamkar, N Kulkarni - Procedia Computer Science, 2016 - Elsevier
This paper attempts to improve the quality and the modification rate of a Stego Image. The
input image provided for estimating the quality of an image and the modification rate is …

Improved LSB image steganography with high imperceptibility based on cover‐stego matching

SNM Al‐Faydi, SK Ahmed… - IET Image Processing, 2023 - Wiley Online Library
Abstract Information security is an important factor when critical information is transferred.
This paper concentrates on finding a method that can hide a message in an image without …

An invisible watermarking scheme based on Modified Fast Haar Wavelet Transform and RSGWPT

S Kaur, M Lal - 2015 2nd International Conference on Recent …, 2015 - ieeexplore.ieee.org
Image-watermarking aims at embedding information into cover media to prove ownership.
This aim is achieved by embedding the copyright information into actual information in such …

An Enhanced Edge Adaptive Steganography Approach using Threshold Value for Region Selection

S Mungmode, RR Sedamkar, N Kulkarni - arXiv preprint arXiv:1601.02076, 2016 - arxiv.org
This paper attempts to improve the quality and the modification rate of a Stego Image. The
input image provided for estimating the quality of an image and the modified rate is a bitmap …

Image Steganography Based on Pixel Topology and Threshold on Selected Pixels Differences

ALD Qusai, TA AL-Assadi - 2023 6th International Conference …, 2023 - ieeexplore.ieee.org
In this paper, the author has suggested a steganography technique that exploits pixels
topology with a pre-determined embedding threshold that uses RGB (Red, Green, Blue) …