Triple-layer image security using a zigzag embedding pattern

S Farrag, W Alexan, HH Hussein - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a triple-layer, high capacity, message security scheme. The first two
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …

[PDF][PDF] An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection

J Jumanto - Cybernetics and information technologies, 2018 - sciendo.com
The Internet is a public network with many issues of data transfer security. Steganography is
a data transmission security technique that is done by hiding the message in a container …

Image steganography using least significant bit (lsb)-a systematic literature review

MA Aslam, M Rashid, F Azam, M Abbas… - … on Computing and …, 2022 - ieeexplore.ieee.org
Digital image steganography is used to hide confidential data within a cover image. In this
context, least significant bit (LSB) is a well-known steganography approach. As LSB is …

Security through blowfish and lsb bit–cycling with mathematical sequences

W Alexan, F Hemeida - 2019 Signal Processing: Algorithms …, 2019 - ieeexplore.ieee.org
Recently, lots of research work and papers are focusing on the combination of
steganography and cryptography. Steganography conceals the presence of a secret …

Payload enhancement on least significant bit image steganography using edge area dilation

DRIM Setiadi - International Journal of Electronics and …, 2019 - yadda.icm.edu.pl
This research proposes a method to enhance the payload message by embedding
messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …

[PDF][PDF] A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography.

EJ Kusuma, CA Sari… - Journal Of ICT …, 2018 - repository.dinus.ac.id
Securing images can be achieved using cryptography and steganography. Combining both
techniques can improve the security of images. Usually, Arnold's transformation (ACM) is …

An image steganography algorithm using LSB replacement through XOR substitution

T Bhuiyan, AH Sarower, R Karim… - … on Information and …, 2019 - ieeexplore.ieee.org
Least Significant Bit replacement, a spatial domain algorithm, is the most popular and widely
used technique in image steganography due to its simplicity and effectiveness. Different …

Simple and secure image steganography using LSB and triple XOR operation on MSB

YP Astuti, EH Rachmawanto… - … on Information and …, 2018 - ieeexplore.ieee.org
Least Significant Bit (LSB) is a very popular method in the spatial domain of steganographic
images. This method is widely used and continues to be developed to date, because of its …

[PDF][PDF] Secure data transfer over internet using image steganography

DM Abdullah, SY Ameen, N Omar… - Asian Journal of …, 2021 - researchgate.net
Whether it's for work or personal well-being, keeping secrets or private information has
become part of our everyday existence. Therefore, several researchers acquire an entire …

Teknik penyembunyian dan enkripsi pesan pada citra digital dengan kombinasi metode LSB dan RSA

AE Handoyo, EH Rachmawanto… - Jurnal Teknologi dan …, 2018 - jtsiskom.undip.ac.id
This study proposed a combination of steganography and cryptography techniques using
LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to …