S Goel, A Rana, M Kaur - Global Journal of Computer Science and …, 2013 - academia.edu
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video …
S Sharda, S Budhiraja - International Journal of Emerging …, 2013 - researchgate.net
Steganography can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. If it is achieved …
Y Li, T Callahan, E Darnell, R Harr, U Kurkure… - Proceedings of the 37th …, 2000 - dl.acm.org
In this paper we describe a new hardware/software partitioning approach for embedded reconfigurable architectures consisting of a general-purpose processor (CPU), a …
F Al-Shaarani, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Secret sharing is an approach for accessing sensitive information by several authorized participants. It shares the secret key in different forms among several authorized participants …
V Kumar, D Kumar - Multimedia Tools and Applications, 2018 - Springer
The main challenges of image steganography are imperceptibility of the cover image and no recoverability of the secret data. To deal with these challenges, a modified digital image …
The rapid advancements in digital communication technology and huge increase in computer power have generated an exponential growth in the use of the Internet for various …
The central role of the cloud data warehouse is to ensure the security of confidential data that can be achieved via techniques of steganography and cryptography. Amidst the growth …
In the latest years, there is an increasing emphasis on DICOM medical images, especially in digital medical images transmission to e-health services. Besides, the confidentiality and …
H Zhang, L Hu - Signal Processing: Image Communication, 2019 - Elsevier
An effective image steganography scheme can make a good compromise among embedding capacity, imperceptibility, security and robustness. This paper presents a novel …