Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …
P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper proposes a double-matrix decomposition image steganography scheme with multi-region …
The advancement of Internet technologies has led to the availability of audios, images, and videos in different forms. The unauthorized users are exploiting the use of multimedia by …
S Maurya, N Nandu, T Patel, VD Reddy… - Quantum Information …, 2023 - Springer
Everyday dealing with enormous amounts of sensitive data requires its protection and communication over the insecure network. The field of 'Steganography'always attracted …
Around the world, the educational system is evolving. The new trend can be found in traditional classroom systems as well as digitalization systems. Cloud-based Learning …
H Kumar, P Mamoria, S Kumari, MK Misra - International Conference on …, 2023 - Springer
This paper discusses various steganography techniques and their parameters. Based on these parameters, we make some comparative analysis among different steganography …
Abstract Internet of Things (IoT) networks are considered the great challenging by emerging technologies that try to solve the problems in modern life, while securing the information still …
FA Baothman, BS Edhah - Journal of Intelligent Systems, 2021 - degruyter.com
In a digital communication environment, information security is mandatory. Three essential parameters used in the design process of a steganography algorithm are Payload, security …
S Rout, RK Mohapatra - Multimedia Tools and Applications, 2024 - Springer
Abstract Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a massive length of digitally …