[PDF][PDF] Review of the Literature on the Steganography Concept

F Şahin, T Çevik, M Takaoğlu - International Journal of Computer …, 2021 - researchgate.net
Information hiding is a subject of study from past to present. Information hiding processes,
called steganography, have been the focus of interest since the beginning of history …

[PDF][PDF] A comparative study of audio steganography schemes

F Hemeida, W Alexan, S Mamdouh - International Journal of …, 2021 - academia.edu
Steganography conceals the existence of secret information, while cryptography hides the
meaning of the confidential information. Therefore, combining these two can provide a …

A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption

SE El-Khamy, NO Korany, MH El-Sherif - Multimedia Tools and …, 2017 - Springer
Steganography is the technique of hiding any secret information like text, image or video
behind a cover file. Audio steganography is one of the widespread data hiding techniques …

Hybrid convolutional neural network architecture driven by residual features for steganalysis of spatial steganographic algorithms

S Arivazhagan, E Amrutha… - Neural Computing and …, 2021 - Springer
The goal of steganalysis is to unearth a concealed message hidden inside an innocent
carrier by steganography. Steganography in the hands of unlawful people can pose a great …

Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations

N Alanazi, E Khan, A Gutub - Arabian Journal for Science and Engineering, 2021 - Springer
This paper introduces a novel method for Arabic text steganography for irreversible practical
usage that involves using the spaces in Unicode standard. The method also benefits from …

Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing

M Nasir, W Jadoon, IA Khan, N Gul, S Shah… - Mathematics, 2022 - mdpi.com
Reversible Data Hiding (RDH) should be secured as per requirements to protect content in
open environments such as the cloud and internet. Integrity and undetectability of …

[PDF][PDF] Secured and robust dual image steganography: A survey

HA Prajapati, NG Chitaliya - … Journal of Innovative Research in Computer …, 2015 - Citeseer
In the last few years communication technology has been improved, which increase the
need of secure data communication. For this, many researchers have exerted much of their …

[PDF][PDF] Secret data hiding using image segmentation and least significant bit (lsb) insertion steganography

K SNGCE - International Journal of Pure and Applied Mathematics, 2017 - researchgate.net
In this paper secret data hided inimage segments using least significant bit (LSB)
steganography is proposed. The color image is divided into four equal parts and the secret …

Stegoframeorder—mac layer covert network channel for wireless ieee 802.11 networks

K Sawicki, G Bieszczad, Z Piotrowski - Sensors, 2021 - mdpi.com
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in
wireless computer networks exploiting non-deterministic algorithms of medium access (such …

Image steganography for confidential data communication

S Sravani, R Raniith - 2021 12th International Conference on …, 2021 - ieeexplore.ieee.org
In the present-day communication system, one of the most important tasks is securing
confidential data through a communication channel. Many adequate encryption and …