Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

Very high capacity image steganography technique using quotient value differencing and LSB substitution

G Swain - Arabian Journal for Science and Engineering, 2019 - Springer
This article proposes a very high capacity steganography technique using differencing and
substitution mechanisms. It divides the image into non-overlapped 3 * 3 3× 3 pixel blocks …

A modified DWT-based image steganography technique

V Kumar, D Kumar - Multimedia Tools and Applications, 2018 - Springer
The main challenges of image steganography are imperceptibility of the cover image and no
recoverability of the secret data. To deal with these challenges, a modified digital image …

Refining image steganography distribution for higher security multimedia counting-based secret-sharing

T AlKhodaidi, A Gutub - Multimedia Tools and Applications, 2021 - Springer
Counting-based secret sharing is becoming a vital efficient multimedia technique for raising
the security of sensitive data especially when collective access to data are essential. Secret …

[HTML][HTML] Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3

AA Attaby, MFMM Ahmed, AK Alsammak - Ain Shams Engineering Journal, 2018 - Elsevier
Abstract Information security relies mainly upon encryption, and in some cases,
steganography for an extra layer of security. Steganography is the science and art of secret …

A safe and secured medical textual information using an improved LSB image steganography

RO Ogundokun, OC Abikoye - International Journal of Digital …, 2021 - Wiley Online Library
Safe conveyance of medical data across unsecured networks nowadays is an essential
issue in telemedicine. With the exponential growth of multimedia technologies and …

Enhancing LSB embedding schemes using chaotic maps systems

L Laimeche, A Meraoumia, H Bendjenna - Neural Computing and …, 2020 - Springer
In our modern life, persons and institutions alike are rapidly embracing the shift toward
communication via the Internet. As these entities adopt a faster and efficient communication …

[HTML][HTML] Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats

S Rahman, J Uddin, H Hussain, S Jan, I Khan… - Sustainability, 2023 - mdpi.com
The Internet and Big Data expansion have motivated the requirement for more generous
stockpiling to hold and share information. Against the current era of information …

An Overview of Information Hiding Techniques Challenges and Applications

AN Kareem, OA Deheyab, AZ Sameen… - Proceedings of the 7th …, 2023 - dl.acm.org
The internet became a common communication platform for many people. However,
information transmission is not secure, and there is a high probability of copying and altering …

[PDF][PDF] Modified multi-level steganography to enhance data security

S Elshare, NN El-Emam - International Journal of Communication …, 2018 - researchgate.net
Data-hiding using steganography algorithm becomes an important technique to prevent
unauthorized users to have access to a secret data. In this paper, steganography algorithm …