An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques

MA Hameed, M Hassaballah, S Aly, AI Awad - IEEE Access, 2019 - ieeexplore.ieee.org
Pixel value differencing (PVD) and least significant bit substitution (LSB) are two widely used
schemes in image steganography. These two methods do not consider different content in a …

Sequence-based bit-cycling in double layer message security

W Alexan, H Medhat, A Hamza… - 2018 Advances in …, 2018 - ieeexplore.ieee.org
This paper proposes two different implementations of a double-layer message security
scheme. In both schemes, the first layer is of a cryptographic nature, employing the AES …

Secure message embedding in audio

R Hussein, W Alexan - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
Since the rise of the Internet, information security has been one of the most important factors
in networking. Cryptography and steganography are the arts and sciences of secret …

[PDF][PDF] Dynamic steganography least significant bit with stretch on pixels neighborhood

MK Harahap, N Khairina - Journal of Information Systems …, 2020 - e-journal.unair.ac.id
Background: The confidentiality of a message may at times be compromised.
Steganography can hide such a message in certain media. Steganographic media such as …

Video steganography based on DCT psychovisual and object motion

M Fuad, F Ernawan - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
Steganography is a technique of concealing the message in multimedia data. Multimedia
data, such as videos are often compressed to reduce the storage for limited bandwidth. The …

Security foundations for application-based covert communication channels

JKH Iv, M Georgiou, AJ Malozemoff… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
We introduce the notion of an application-based covert channel—or ABCC—which provides
a formal syntax for describing covert channels that tunnel messages through existing …

Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement

S Prasad, AK Pal - Emerging Technologies in Data Mining and Information …, 2019 - Springer
In recent, the confidentiality of important data is indispensable for Internet users. Although
both the encryption and steganography schemes are well suited to protect the confidentiality …

A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things.

S SP - Computational Intelligence, 2020 - search.ebscohost.com
The rapid growth of the internet and the internet of things (IoT) refers to the next phase of
information revolution whose context involves billions of smart devices and sensors …

Application of steganography imaging by AES and random bit

A Harika, S Anamalamudi, S Humayra… - 2021 13th …, 2021 - ieeexplore.ieee.org
The goal of steganography is to hide the data in another medium, meaning disguising the
data, so that the existence of the messages can be concealed. Steganography can be …

Lsb data hiding in digital media: a survey

DN Tran, HJ Zepernick, TMC Chu - EAI Endorsed Transactions on …, 2022 - diva-portal.org
Data hiding or information hiding is a prominent class of information security that aims at
reliably conveying secret data embedded in a cover object over a covert channel. Digital …