J Jumanto - Cybernetics and information technologies, 2018 - sciendo.com
The Internet is a public network with many issues of data transfer security. Steganography is a data transmission security technique that is done by hiding the message in a container …
MA Aslam, M Rashid, F Azam, M Abbas… - … on Computing and …, 2022 - ieeexplore.ieee.org
Digital image steganography is used to hide confidential data within a cover image. In this context, least significant bit (LSB) is a well-known steganography approach. As LSB is …
W Alexan, F Hemeida - 2019 Signal Processing: Algorithms …, 2019 - ieeexplore.ieee.org
Recently, lots of research work and papers are focusing on the combination of steganography and cryptography. Steganography conceals the presence of a secret …
DRIM Setiadi - International Journal of Electronics and …, 2019 - yadda.icm.edu.pl
This research proposes a method to enhance the payload message by embedding messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …
EJ Kusuma, CA Sari… - Journal Of ICT …, 2018 - repository.dinus.ac.id
Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold's transformation (ACM) is …
Least Significant Bit replacement, a spatial domain algorithm, is the most popular and widely used technique in image steganography due to its simplicity and effectiveness. Different …
Least Significant Bit (LSB) is a very popular method in the spatial domain of steganographic images. This method is widely used and continues to be developed to date, because of its …
DM Abdullah, SY Ameen, N Omar… - Asian Journal of …, 2021 - researchgate.net
Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire …
AE Handoyo, EH Rachmawanto… - Jurnal Teknologi dan …, 2018 - jtsiskom.undip.ac.id
This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to …