LSB layer independent robust steganography using binary addition

B Datta, U Mukherjee, SK Bandyopadhyay - Procedia Computer Science, 2016 - Elsevier
In the field of security different steganography techniques hides data within the cover media
in such a way so that human perception cannot follow it. All of these also try to follow three …

A novel LSB based image steganography with multi-level encryption

GS Charan, NK SSV, B Karthikeyan… - … on innovations in …, 2015 - ieeexplore.ieee.org
Steganography is an art of hiding the existence of secret information by embedding it in a
cover and hence preventing the unauthorized access of confidential information. This paper …

[PDF][PDF] An improved steganographic technique using LSB replacement on a scanned path image

B Karthikeyan, S Ramakrishnan… - … Journal of Network …, 2014 - ijns.jalaxy.com.tw
Transfer of secret data is an important aspect in the arena of developing technology. Privacy
of data is one of the major tasks required now days. In this paper, we dealt with …

An efficient arithmetic coding data compression with steganography

M Gomathymeenakshi, S Sruti… - … ON Emerging Trends …, 2013 - ieeexplore.ieee.org
Data transmission must be secure enough to be used in a channel medium without any loss
and tampering of data. Data sent in a compact way adds to the efficiency in sustaining the …

Quality enhancement of visual cryptography for secret sharing of binary, gray and color images

RN Chaturvedi, SD Thepade… - … Control and Automation …, 2018 - ieeexplore.ieee.org
Obscuring the important message before disseminating become obligatory. In a traditional
(n, k) threshold visual secret sharing (VSS), size of the reassembled secret is more than the …

An enhanced Hill cipher approach for image encryption in steganography

B Karthikeyan, J Chakravarthy… - … Journal of Electronic …, 2013 - inderscienceonline.com
In this paper, a new approach is adopted to embed an image within an image using a
modified Hill cipher method. The secret image is taken and rearranged to form N 2× 2 …

OTP Camouflaging using LSB Steganography and Public Key Cryptography

APV Manindra, B Karthikeyan - 2022 3rd International …, 2022 - ieeexplore.ieee.org
One Time Password (OTP) provides an additional layer of authentication to a web server,
protecting against fraudulent attempts so that the information is protected between the user …

LSB based Image Steganography with the aid of secret key and enhance its capacity via reducing bit string length

P Kanojia, V Choudhary - 2019 3rd International conference on …, 2019 - ieeexplore.ieee.org
Data hiding is an approach in which one can transmit the information to the exact user
without notice to third person. Nowadays, the all information is available across the web has …

Enhanced hybrid image security algorithms for high definition images in multiple applications

SM Wadi, N Zainal - Multidimensional Systems and Signal Processing, 2018 - Springer
Protection of multimedia information from different types of attackers has become important
for people and governments. A high definition image has a large amount of data, and thus …

A hybrid technique for quadrant based data hiding using Huffman coding

RK TKC, B Karthikeyan… - … on Innovations in …, 2015 - ieeexplore.ieee.org
The paper proposes a robust steganography technique to hide the data in an image. The
method proposed uses Huffman coding to minimize the number of bits to be embedded and …