A new high capacity and secure image realization steganography based on ASCII code matching

HT Elshoush, MM Mahmoud, A Altigani - Multimedia Tools and …, 2022 - Springer
Digital Steganography is the art of hiding secret messages behind an innocent looking
digital media that do not raise suspicions. In this paper, a new proposed image realization …

[PDF][PDF] Design and development of image security technique by using cryptography and steganography: a combine approach

AK Saxena, S Sinha, P Shukla - International Journal of Image …, 2018 - researchgate.net
This paper proposes security technique for the confidential data which is the combination of
three techniques, first is image compression that is based on wavelet transformation which …

Steganography in IoT: Information Hiding with Joystick and Touch Sensors

K Koptyra, MR Ogiela - Sensors, 2023 - mdpi.com
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses
two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are …

[PDF][PDF] Image steganography based on swarm intelligence algorithms: A survey

DA Zebari, DQ Zeebaree, JN Saeed, NA Zebari… - people, 2020 - academia.edu
Abstract Information security and confidentiality are the prime concern of any type of
communication. The techniques that utilizing inconspicuous digital media such as text …

[PDF][PDF] A literature survey on stenography approach based on different LSB technique

K Saraswati, PS Sharma - no, 2021 - jctjournals.com
In today world digital Image processing is used in many fields like computer vision, remote
sensing, medical imaging, robotics, satellite images and aerial photography etc. There are …

Two-layer security of images using elliptic curve cryptography with discrete wavelet transform

M Ganavi, S Prabhudeva - International Journal of Computer …, 2023 - search.proquest.com
Abstract Information security is an important part of the current interactive world. It is very
much essential for the end-user to preserve the confidentiality and integrity of their sensitive …

Eigenfaces-based steganography

T Hachaj, K Koptyra, MR Ogiela - Entropy, 2021 - mdpi.com
In this paper we propose a novel transform domain steganography technique—hiding a
message in components of linear combination of high order eigenfaces vectors. By high …

A modified hash based least significant bits algorithm for steganography

SD Muyco, AA Hernandez - … of the 4th International Conference on Big …, 2019 - dl.acm.org
New development in computer security has focused on security using only the cryptography
and steganography techniques as well, or the combination of both. In steganography, the …

Modified encryption standard for reversible data hiding using AES and LSB steganography

BE Raju, MR Sankar, TS Kumar… - 2023 International …, 2023 - ieeexplore.ieee.org
The development in the cloud computing technologies and the information security policy,
the data recovery from the hidden technologies is improved and also it is most implemented …

FPGA based low power hardware for quality access control of compressed gray scale image

H Mandal, A Phadikar, GK Maity, TL Chiu - Microsystem Technologies, 2018 - Springer
This paper proposes novel hardware architecture of passive data-hiding scheme for quality
access control of digital image in discrete cosine transform compressed domain. Both serial …