Image steganography approach based ant colony optimization with triangular chaotic map

M Bhandari, S Panday, CP Bhatta… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
To establish the secure communication using image steganography by hiding the
information in cover image, the study focus on image steganography based on Ant Colony …

Visual analysis based on CMY and RGB image cryptography using vigenere and beaufort cipher

CA Sari, DW Utomo, MAS Doheir - Kinetik: Game Technology …, 2023 - kinetik.umm.ac.id
The achievement of visual aspects and image security often cannot meet visibility standards,
for example the acquisition of PSNR and UACI NPCR values. To increase security, this …

[PDF][PDF] A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang

LB Handoko, AD Krismawan - Journal of Applied …, 2021 - pdfs.semanticscholar.org
The increase in significant advances in information technology greatly provides comfort and
convenience in managing data. This convenience is what makes people who are not …

Confidentiality in medical images through a genetic-based steganography algorithm in artificial intelligence

E Vazquez, S Torres, G Sanchez, JG Avalos… - Frontiers in Robotics …, 2022 - frontiersin.org
Nowadays, image steganography has an important role in hiding information in advanced
applications, such as medical image communication, confidential communication and secret …

Implementation of image fusion method for watermark on color image using wavelet transformation domain

AM Widodo, B Tjahjono - … of the 2017 International Conference on …, 2017 - dl.acm.org
Along with the development of computer technology, digital data especially data in the form
of digital images, which caused new problems that was copyright issues was used. to show …

An Adaptive Frequency Based Steganography Technique

S Chhikara, R Kumar - International Conference on Information …, 2018 - Springer
Steganography is an art of embedding data in an imperceptible way. Steganography
technique has two category based on transformation: spatial and frquency domain …