Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

[HTML][HTML] A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques

IQ Abduljaleel, ZA Abduljabbar, MA Al Sibahee… - Journal of Sensor and …, 2022 - mdpi.com
Data security can involve embedding hidden images, text, audio, or video files within other
media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …

[HTML][HTML] Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage

P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …

A secured frame selection based video watermarking technique to address quality loss of data: combining graph based transform, singular valued decomposition, and …

C Sharma, B Amandeep, R Sobti… - Security and …, 2021 - Wiley Online Library
The advancement of Internet technologies has led to the availability of audios, images, and
videos in different forms. The unauthorized users are exploiting the use of multimedia by …

A discrete cosine transform-based intelligent image steganography scheme using quantum substitution box

S Maurya, N Nandu, T Patel, VD Reddy… - Quantum Information …, 2023 - Springer
Everyday dealing with enormous amounts of sensitive data requires its protection and
communication over the insecure network. The field of 'Steganography'always attracted …

[HTML][HTML] Enhancing data security of cloud based lms

P Chatterjee, R Bose, S Banerjee, S Roy - Wireless Personal …, 2023 - Springer
Around the world, the educational system is evolving. The new trend can be found in
traditional classroom systems as well as digitalization systems. Cloud-based Learning …

Video Steganography Techniques: A Comprehensive Review and Performance Evaluation

H Kumar, P Mamoria, S Kumari, MK Misra - International Conference on …, 2023 - Springer
This paper discusses various steganography techniques and their parameters. Based on
these parameters, we make some comparative analysis among different steganography …

IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography

A Alarood, N Ababneh, M Al-Khasawneh… - Cluster …, 2022 - Springer
Abstract Internet of Things (IoT) networks are considered the great challenging by emerging
technologies that try to solve the problems in modern life, while securing the information still …

[HTML][HTML] Toward agent-based LSB image steganography system

FA Baothman, BS Edhah - Journal of Intelligent Systems, 2021 - degruyter.com
In a digital communication environment, information security is mandatory. Three essential
parameters used in the design process of a steganography algorithm are Payload, security …

Secure video steganographic model using framelet transform and elliptic curve cryptography

S Rout, RK Mohapatra - Multimedia Tools and Applications, 2024 - Springer
Abstract Information security holds a quintessential role in the era of digital communication.
Nowadays, social media has become the new platform to share a massive length of digitally …