A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

Huffman encoding with white tailed eagle algorithm-based image steganography technique

S Alkhliwi - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Since the Internet is a medium for transporting sensitive data, the privacy of the message
transported has become a major concern. Image steganography has become a prominent …

Novel asymmetric cryptosystem to secure the digital images using QZS and random modulus decomposition

S Singh, AB Joshi - Optical and Quantum Electronics, 2024 - Springer
This research paper proposes a novel technique of asymmetric cryptosystem to secure the
digital color images using the QZS algorithm and random modulus decomposition (RMD) …

[PDF][PDF] A comprehensive study of digital image steganographic techniques

H Hussain, AA Khan, A Ahmed… - IEEE Access https://doi …, 2023 - academia.edu
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

A novel watermarking scheme for medical image using support vector machine and lifting wavelet transform

P Pal, P Chowdhuri, T Si - Multimedia Tools and Applications, 2023 - Springer
Digital image watermarking has become a valuable tool for preventing unauthorized use
and alteration of digital images due to technological advancements. A fundamental difficulty …

An Investigation of Image Security and Image Steganography Techniques

D Thangaraju, R Asokan - 2023 Second International …, 2023 - ieeexplore.ieee.org
In recent days, data transmission has increased a lot and they demand high security
protocols for the safe transmission of data. Among the different types of data, images are …

Two-Level Security of Color Image Using 9D-Hyperchaotic System and DWT

S Singh, AB Joshi - International Conference on Cryptology & Network …, 2022 - Springer
This research paper proposes a novel technique to secure the color image using a 9D-
hyperchaotic system and Discrete Wavelet Transform (DWT). The proposed scheme uses a …