A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement

M Hussain, AWA Wahab, ATS Ho, N Javed… - Signal Processing: Image …, 2017 - Elsevier
The fundamental objectives of image steganographic algorithm are to simultaneously
achieve high payload, good visual imperceptibility, and security. This paper proposes a new …

Eye tracking assisted extraction of attentionally important objects from videos

K Shanmuga Vadivel, T Ngo… - Proceedings of the …, 2015 - openaccess.thecvf.com
Visual attention is a crucial indicator of the relative importance of objects in visual scenes to
human viewers. In this paper, we propose an algorithm to extract objects which attract visual …

A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

Introduction to digital image steganography

M Hassaballah, MA Hameed, MH Alkinani - Digital Media Steganography, 2020 - Elsevier
The Internet and cloud services are widely used in transmission of large amounts of data
over open networks and insecure channels, exposing private and secret data to serious …

Steganography based on pixel intensity value decomposition

AA Abdulla, H Sellahewa… - Mobile Multimedia/Image …, 2014 - spiedigitallibrary.org
This paper focuses on steganography based on pixel intensity value decomposition. A
number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan …

A novel image tamper localization and recovery algorithm based on watermarking technology

J Zhang, Q Zhang, H Lv - Optik, 2013 - Elsevier
In this paper, an effective self-embedding fragile watermarking scheme is presented. The
watermark is generated by encoding the DCT coefficients of each 2× 2 block and embedded …

Authentication/secret message transformation through wavelet transform based subband image coding (WTSIC)

JK Mandal, M Sengupta - 2010 International Symposium on …, 2010 - ieeexplore.ieee.org
In this paper a DWT based frequency domain steganographic technique, termed as WTSIC
has been proposed where the cover PPM image transform into the time domain through …

A steganographic scheme for colour image authentication (SSCIA)

N Ghoshal, JK Mandal - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
This paper deals with a novel steganographic technique which demonstrates the colour
image authentication technique in frequency domain based on the Discrete Fourier …

A genetic algorithm based steganography in frequency domain (GASFD)

JK Mandal, A Khamrui - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Image steganography is the art of hiding information onto the cover image. In this paper a
Genetic Algorithm based color image authentication/data hiding technique through …

Authentication through Hough transformation generated signature on G-Let D3 Domain (AHSG)

M Sengupta, JK Mandal - Procedia Technology, 2013 - Elsevier
In this paper a G-Let based authentication technique has been proposed to authenticate
digital documents through Hough transform generated signature generated from original …