Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Security and privacy aspects of electronic health records: A review

D Sharma, C Prabha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
With the growth in population, there is an increase in the amount of Electronic Health
Records (EHR) and so is the rise in concern regarding their security and privacy. At present …

[PDF][PDF] Implementation of image file security using the advanced encryption standard method

A Ikhwan, RAA Raof, P Ehkan, YM Yacob… - Indonesian Journal of …, 2023 - academia.edu
The application of technology in this era has entered digitalization and is modern. Therefore,
we are already in an era of advanced and rapid technological development. It has become a …

[HTML][HTML] Enhanced payload volume in the least significant bits image steganography using hash function

YY Ghadi, T AlShloul, ZI Nezami, H Ali, M Asif… - PeerJ Computer …, 2023 - peerj.com
The art of message masking is called steganography. Steganography keeps communication
from being seen by any other person. In the domain of information concealment within …

Jaccard-based Random Distribution with Least and Most Significant Bit Hiding Methods for Highly Patients MRI Protected Privacy

AJT Albderi, D Al-Shammary, LB Said - JOIV: International Journal on …, 2023 - joiv.org
In this study, the main goal is to improve patient care by making it easier for patient data and
pictures to be sent between medical centers without problems. Still, one of the biggest …

[PDF][PDF] An image steganography using improved hyper-chaotic Henon map and fractal tromino

S Nagarajegowda, K Krishnan - International Journal of Electrical …, 2023 - academia.edu
Steganography is a vital security approach that hides any secret content within ordinary
data, such as multimedia. First, the cover image is converted into a wavelet environment …

Cartesian coordinated adaptive hiding for payload peaking

V Manikandan, R Amirtharajan - Multimedia Tools and Applications, 2024 - Springer
Transferring multimedia content without detection has gained traction over time. Employing
steganography for hiding secret data, viz. passwords, medical information, and private …

[Retracted] Research on Injury Causes and Prevention Effect of College Rowing Athletes Based on Multiple Regression and Residual Algorithm

N Mu - Journal of Environmental and Public Health, 2022 - Wiley Online Library
Rowing competition in colleges and universities is an international competition, and it is also
a favorite competition for college students. However, in the course of rowing competition, the …

A Comprehensive Review on Steganography Techniques for Text, Images, and Audio

TS Padmaja, SM Basha - 2023 IEEE Fifth International …, 2023 - ieeexplore.ieee.org
In audio steganography, artificial intelligence (AI) can boost system security by improving the
accuracy and efficiency of encoding and decoding activities. AI techniques like Convnets …

[PDF][PDF] Continuum Wavelets and Distributions

YK Dem'yanovich, ON Ivantsova… - WSEAS Transactions on …, 2022 - wseas.com
The purpose of this work is to obtain a wavelet expansion of information flows, which are
distribution flows (in the terminology of Schwartz). The concept of completeness is …