An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography

MR Islam, A Siddiqa, MP Uddin… - … , Electronics & Vision …, 2014 - ieeexplore.ieee.org
In Steganography, the total message will be invisible into a cover media such as text, audio,
video, and image in which attackers don't have any idea about the original message that the …

A secure data communication system using cryptography and steganography

S Saraireh - International Journal of Computer Networks & …, 2013 - papers.ssrn.com
The information security has become one of the most significant problems in data
communication. So it becomes an inseparable part of data communication. In order to …

A secure and high capacity image steganography technique

UD Acharya, PR Kamath - arXiv preprint arXiv:1304.3629, 2013 - arxiv.org
Steganography is the science of invisible communication. The purpose of Steganography is
to maintain secret communication between two parties. The secret information can be …

A secure color image steganography in transform domain

UD Acharya, PR Kamath - arXiv preprint arXiv:1304.3313, 2013 - arxiv.org
Steganography is the art and science of covert communication. The secret information can
be concealed in content such as image, audio, or video. This paper provides a novel image …

Color image steganography in YCbCr space

ZA Alwan, HM Farhan… - International Journal of …, 2020 - search.proquest.com
Steganography is a best method for in secret communicating information during the
transference of data. Images are an appropriate method that used in steganography can be …

A new dataset of word-level offline handwritten numeral images from four official Indic scripts and its benchmarking using image transform fusion

SM Obaidullah, C Halder, N Das… - International Journal of …, 2016 - inderscienceonline.com
Handwritten document image dataset development is one of the most tedious and time
consuming tasks in optical character recogniser (OCR) related experimental work. Special …

Authentication through Hough transformation generated signature on G-Let D3 Domain (AHSG)

M Sengupta, JK Mandal - Procedia Technology, 2013 - Elsevier
In this paper a G-Let based authentication technique has been proposed to authenticate
digital documents through Hough transform generated signature generated from original …

A secure image steganography technique to hide multiple secret images

S Hemalatha, U Dinesh Acharya, A Renuka… - Computer Networks & …, 2013 - Springer
Steganography is the science of “invisible” communication. The purpose of Steganography
is to maintain secret communication between two parties. The secret information can be …

[PDF][PDF] Radio frequency based sensor: an innovative detection tool for food spoilage

R Kant, PK Prabhakar, S Samadder… - The Pharma …, 2017 - researchgate.net
Market demands for new sensors for food quality and safety stimulate the development of
new sensing technologies that can provide an unobtrusive sensor form, battery-free …

A corpus of word-level offline handwritten numeral images from official indic scripts

SM Obaidullah, C Halder, N Das, K Roy - Proceedings of the Second …, 2016 - Springer
Dataset development is one of the most imperative tasks in document image processing
research. The problem becomes more challenging when it comes about Numeral Image …