Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

Multiplexing optical images for steganography by single metasurfaces

Y Cao, L Tang, J Li, C Lee, ZG Dong - Small, 2023 - Wiley Online Library
Image steganography based on intelligent devices is one of the effective routes for safely
and quickly transferring secret information. However, optical image steganography has …

Exploring face detection and recognition in steganography

U Pilania, R Tanwar, N Nandal - Unleashing the art of digital …, 2022 - taylorfrancis.com
Security of the online transmission of personal information is of utmost importance these
days. Integrating face detection and recognition with steganography techniques improves …

A new combinational technique in image steganography

S Pramanik, D Samanta… - International Journal of …, 2021 - igi-global.com
Internet is used for exchanging information. Sometimes it is needed to transmit confidential
data via internet. Here the authors use image steganography to pass confidential data within …

[PDF][PDF] A combination of least significant bit and deflate compression for image steganography

HK Tayyeh, ASA Al-Jumaili - International Journal of Electrical and …, 2022 - academia.edu
Steganography is one of the cryptography techniques where secret information can be
hidden through multimedia files such as images and videos. Steganography can offer a way …

Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats

S Rahman, J Uddin, H Hussain, S Jan, I Khan… - Sustainability, 2023 - mdpi.com
The Internet and Big Data expansion have motivated the requirement for more generous
stockpiling to hold and share information. Against the current era of information …

[PDF][PDF] Dwt-svd based image steganography using threshold value encryption method.

J Khandelwal, VK Sharma, D Singh… - Computers, Materials & …, 2022 - cdn.techscience.cn
Digital image steganography technique based on hiding the secret data behind of cover
image in such a way that it is not detected by the human visual system. This paper presents …

Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing

M Nasir, W Jadoon, IA Khan, N Gul, S Shah… - Mathematics, 2022 - mdpi.com
Reversible Data Hiding (RDH) should be secured as per requirements to protect content in
open environments such as the cloud and internet. Integrity and undetectability of …

Data security using multiple image steganography and hybrid data encryption techniques

R Joshi, AK Bairwa, V Soni… - … for Advancement in …, 2022 - ieeexplore.ieee.org
There are advances in data stealth and forgery with the rise of technology and advances in
data transmission. This arises the need for better and developed methods for data …

Advancement on Steganography: A Review

A Arshad, N Siddiqui, S Islam - International Conference on Data Science …, 2024 - Springer
There have been numerous advancements in information exchange and covert information
exchange in recent years by virtue of the various methodologies proposed. Thus, there is a …