Fuzzy logic-based steganographic scheme for high payload capacity with high imperceptibility

I Théophile, NJ De La Croix… - 2023 11th International …, 2023 - ieeexplore.ieee.org
When communicating confidential information between two parties, it is crucial to consider
the security of the information. Cryptography, as well as steganography, are essentially used …

Neural networks-based data hiding in digital images: overview

K Dzhanashia, O Evsutin - Neurocomputing, 2024 - Elsevier
Nowadays, neural networks are actively used for data hiding; however, there is currently no
systematic knowledge regarding their utilization in this field. This is a significant gap …

Image steganography using LSB and hybrid encryption algorithms

M Alanzy, R Alomrani, B Alqarni, S Almutairi - Applied Sciences, 2023 - mdpi.com
In today's era of widespread web technology and cloud computing, ensuring data security
has become a crucial concern across various industries. Instances of data breaches and …

Secure and Imperceptible Frequency-Based Watermarking for Medical Images

S Naima, AZE Boukhamla, Z Narima, K Amine… - Circuits, Systems, and …, 2024 - Springer
Medical image security is a critical concern in the healthcare domain, and various
watermarking techniques have been explored to embed imperceptible and secure data …

Reduced Difference Expansion based on Cover Image Bisection for a Quality Stego Image

AKS Jahbel, T Ahmad… - 2024 Conference on …, 2024 - ieeexplore.ieee.org
Nowadays, ensuring the security of shared information is a primary concern to avoid
unwanted interception between the communicating parts over the public network. A …

A secure video data streaming model using modified firefly and SVD technique

K Muthulakshmi, K Valarmathi - Multimedia Systems, 2024 - Springer
Due to the expression of sharing information, there has been an increase in interest in
safeguarding multimedia information and copyrights in recent times. Attackers are …

Covert Communication through Robust Fragment Hiding in a Large Number of Images

P Wang, H Zhong, Y Feng, L Gong, Y Tang, ZM Lu… - Sensors, 2024 - mdpi.com
For covert communication in lossy channels, it is necessary to consider that the carrier of the
hidden watermark will undergo multiple image-processing attacks. In order to ensure that …

Steganography in Grayscale Images: Improving the Quality of a Stego Image

AWC D'Layla, M Nevin, GGS Putra… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
The development of digital multimedia has become a promising solution for maintaining the
confidentiality of sensitive data by using them as carriers of secret bits. Hiding confidential …

Integer wavelet transform based data hiding scheme for electrocardiogram signals protection

MM Sayah, Z Narima, K Amine… - International Journal …, 2024 - inderscienceonline.com
A significant security and protection concern in telemedicine at the moment is how to secure
the confidentiality of sensitive data delivered over the Internet and limit access to designated …

Image Steganography using Customized Differences between the Neighboring Pixels

IF Ramadhan, RDA Anandha… - … on Informatics and …, 2024 - ieeexplore.ieee.org
Steganography in digital images, a method of concealing secret data within multimedia files
like images, audio, and video, is gaining attention for safeguarding sensitive information …