Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Hiding data using efficient combination of RSA cryptography, and compression steganography techniques

OFA Wahab, AAM Khalaf, AI Hussein… - IEEE access, 2021 - ieeexplore.ieee.org
Data compression is an important part of information security because compressed data is
more secure and easy to handle. Effective data compression technology creates efficient …

Image steganography approaches and their detection strategies: A survey

MH Kombrink, ZJMH Geradts, M Worring - ACM Computing Surveys, 2024 - dl.acm.org
Steganography is the art and science of hidden (or covered) communication. In digital
steganography, the bits of image, video, audio and text files are tweaked to represent the …

Medical image watermarking for telemedicine application security

K Amine, K Fares, KM Redouane… - Journal of Circuits …, 2022 - World Scientific
In this work, we proposed a robust and blind watermarking approach to adequately secure
medical images exchanged in telemedicine. This approach ensures the traceability and …

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

S Rahman, J Uddin, H Hussain, A Ahmed, AA Khan… - Scientific Reports, 2023 - nature.com
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …

A novel steganography method for binary and color halftone images

E Çiftci, E Sümer - PeerJ Computer Science, 2022 - peerj.com
Digital steganography is the science of establishing hidden communication on electronics;
the aim is to transmit a secret message to a particular recipient using unsuspicious carriers …

A value parity combination based scheme for retinal images watermarking

F Kahlessenane, A Khaldi, MR Kafi, N Zermi… - Optical and Quantum …, 2021 - Springer
In order to improve the security of images exchanged in telemedicine, we propose in this
paper, 2 watermarking schemes for retinal image protection; each scheme will be declined …

Hiding text using the least significant bit technique to improve cover image in the steganography system

EHJ Halboos, AM Albakry - Bulletin of Electrical Engineering and …, 2022 - beei.org
One of the highest priorities in the era of information technology is to achieve an accurate
and effective system for hiding security data. One of the goals of steganography is …

[PDF][PDF] Increasing the efficiency of information transmission in communication channels

B Zhurakovskyi, J Boiko, V Druzhynin… - Indonesian Journal of …, 2020 - researchgate.net
This paper discusses compression methods focused on data transmission over
communication channels. The characteristics of different algorithms for different types of …

Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices

HM Mohammad, AA Abdullah - … Computing Electronics and …, 2022 - telkomnika.uad.ac.id
The restricted devices have a small memory, simple processor, and limited power. To secure
them, we need lightweight cryptography algorithms, taking into account the limited …