High security data hiding using image cropping and LSB least significant bit steganography

KA Al-Afandy, OS Faragallah… - 2016 4th IEEE …, 2016 - ieeexplore.ieee.org
A high security data hiding approach using image cropping and Least Significant Bit (LSB)
steganography is proposed. The predefined certain secret coordinate crops are extracted …

A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption

SE El-Khamy, NO Korany, MH El-Sherif - Multimedia Tools and …, 2017 - Springer
Steganography is the technique of hiding any secret information like text, image or video
behind a cover file. Audio steganography is one of the widespread data hiding techniques …

Secure encrypted steganography graphical password scheme for near field communication smartphone access control system

SN Cheong, HC Ling, PL Teh - Expert Systems with Applications, 2014 - Elsevier
The revolutionary development of smartphone which offers compelling computing and
storage capabilities has radically changed the digital lifestyles of users. The integration of …

Confidentiality considerations: multimedia signals transmission over different wireless channels utilized efficient secured model

SS Nassar, MAM El-Bendary - Multimedia Tools and Applications, 2022 - Springer
The confidentiality of highly-sensitive multimedia signals is considered in this paper, it can
be enhanced by efficient secured model utilizing several-layer security algorithms. The …

Secure wireless image communication using LSB steganography and chaotic baker ciphering

SS Nassar, NM Ayad, HM Kelash, HS El-Sayed… - Wireless Personal …, 2016 - Springer
The popularity of wireless multimedia applications in real life and the open nature of
wireless media for access make the security of confidential multimedia over wireless …

FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks

MAM El-Bendary - Multimedia Tools and Applications, 2017 - Springer
In this research paper, robust and reliable encrypted steganography technique with the error
control schemes is presented. It also, investigates the performance of this technique with …

[PDF][PDF] Secret data hiding using image segmentation and least significant bit (lsb) insertion steganography

K SNGCE - International Journal of Pure and Applied Mathematics, 2017 - researchgate.net
In this paper secret data hided inimage segments using least significant bit (LSB)
steganography is proposed. The color image is divided into four equal parts and the secret …

Secret communication using public key steganography

M Mishra, G Tiwari, AK Yadav - International Conference on …, 2014 - ieeexplore.ieee.org
This paper introduces a new steganographic technique for secret data communication
based on Public Key Digital Image steganography by combining public key cryptography …

A comparative study of methods for hiding large size audio file in smaller image carriers

AA Alfa, KB Ahmed, S Misra, A Adewumi… - … : Microservices in Big …, 2019 - Springer
The last 13 years or more has been characterized by unmatched progress in multimedia
content and undercover communication. Sound file is chief among mode of transmitting …

[PDF][PDF] An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography.

KHA Al-Shqeerat - Computer Systems Science & …, 2023 - pdfs.semanticscholar.org
Text-based passwords are still widely used as a standard method of user authentication.
Although conventional text-based passwords are rather hard to remember, users often write …