Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography

S Pramanik, RP Singh, R Ghosh - Multimedia Tools and Applications, 2020 - Springer
The Internet is used for exchanging information. Sometimes it is required to transmit
confidential data over the internet. Here the authors use image steganography to embed …

Analysis review on spatial and transform domain technique in digital steganography

FQA Alyousuf, R Din, AJ Qasim - Bulletin of Electrical Engineering and …, 2020 - beei.org
This paper presents several techniques used in digital steganography in term of spatial and
transform domain. Additionally, it analyses the performance and the metric evaluation of the …

A new combinational technique in image steganography

S Pramanik, D Samanta… - International Journal of …, 2021 - igi-global.com
Internet is used for exchanging information. Sometimes it is needed to transmit confidential
data via internet. Here the authors use image steganography to pass confidential data within …

[PDF][PDF] A new encrypted method in image steganography

S Pramanik, RP Singh, R Ghosh - Indonesian Journal of Electrical …, 2019 - researchgate.net
Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a
cover image using image steganography. CAPTCHA are the crazy codes. They are used in …

Internet of things (iot) applications, tools and security techniques

R Kawatra, DK Dharamdasani, R Ajmera… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) has transformed cultural traditions into high-tech ones. Urban
areas, smart industries, smart devices, environmental management, smart transportation …

Watermarking techniques for the security of medical images and image sequences

H Alquhayz, B Raza - Arabian Journal for Science and Engineering, 2022 - Springer
Digital medical images and image sequences, such as magnetic resonance imaging,
computed tomography, and ultrasound, are widely used to diagnose diseases and …

Two-dimensional modified pixel value differencing () image steganography with error control and security using stream encryption

A Broumandnia - Multimedia Tools and Applications, 2024 - Springer
Along with the development of communication networks and the facilitation of multimedia
data transmission, the issue of data security is always raised, and there is a concern that the …

[PDF][PDF] Two-level hiding an encrypted image

FHM Al-Kadei - Indonesian Journal of Electrical Engineering and …, 2020 - academia.edu
Encryption and hiding images are becoming a hot research area and a broad prospect for
application. This article uses a secure algorithm with Low Significant Bit method to hide an …

Developing audio data hiding scheme using random sample bits with logical operators

MHA Al-Hooti, T Ahmad, S Djanali - Indonesian Journal of Electrical …, 2019 - scholar.its.ac.id
Sharp development progress of information technology has affected many aspects including
data security. This is because classified data are often transferred between systems. In this …

[PDF][PDF] An Improved Method for Hiding Text in Image Using Header Image

NAA Mustafa - Waist Journal of Computer and Mathematic Science, 2022 - iasj.net
The necessities of steganography methods for hiding secret message into images have
been ascend. Thereby, this study is to generate a practical steganography procedure to hide …