[HTML][HTML] Securing matrix counting-based secret-sharing involving crypto steganography

F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever,
especially with our growing dependence on online services and the transfer of information …

[PDF][PDF] A review of comparison techniques of image steganography

S Goel, A Rana, M Kaur - Global Journal of Computer Science and …, 2013 - academia.edu
Steganography is an important area of research in recent years involving a number of
applications. It is the science of embedding information into the cover image viz., text, video …

[PDF][PDF] Image steganography: A review

S Sharda, S Budhiraja - International Journal of Emerging …, 2013 - researchgate.net
Steganography can be defined as the study of invisible communication that usually deals
with the ways of hiding the existence of the communicated message. If it is achieved …

Hardware-software co-design of embedded reconfigurable architectures

Y Li, T Callahan, E Darnell, R Harr, U Kurkure… - Proceedings of the 37th …, 2000 - dl.acm.org
In this paper we describe a new hardware/software partitioning approach for embedded
reconfigurable architectures consisting of a general-purpose processor (CPU), a …

Increasing participants using counting-based secret sharing via involving matrices and practical steganography

F Al-Shaarani, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Secret sharing is an approach for accessing sensitive information by several authorized
participants. It shares the secret key in different forms among several authorized participants …

A modified DWT-based image steganography technique

V Kumar, D Kumar - Multimedia Tools and Applications, 2018 - Springer
The main challenges of image steganography are imperceptibility of the cover image and no
recoverability of the secret data. To deal with these challenges, a modified digital image …

Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography

AA Abdulla - 2015 - bear.buckingham.ac.uk
The rapid advancements in digital communication technology and huge increase in
computer power have generated an exponential growth in the use of the Internet for various …

Secret images transfer in cloud system based on investigating quantum walks in steganography approaches

AA Abd El-Latif, B Abd-El-Atty, S Elseuofi… - Physica A: Statistical …, 2020 - Elsevier
The central role of the cloud data warehouse is to ensure the security of confidential data
that can be achieved via techniques of steganography and cryptography. Amidst the growth …

[HTML][HTML] Hiding patients' medical reports using an enhanced wavelet steganography algorithm in DICOM images

MA Ahmad, M Elloumi, AH Samak… - Alexandria Engineering …, 2022 - Elsevier
In the latest years, there is an increasing emphasis on DICOM medical images, especially in
digital medical images transmission to e-health services. Besides, the confidentiality and …

A data hiding scheme based on multidirectional line encoding and integer wavelet transform

H Zhang, L Hu - Signal Processing: Image Communication, 2019 - Elsevier
An effective image steganography scheme can make a good compromise among
embedding capacity, imperceptibility, security and robustness. This paper presents a novel …