Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing

D Huo, Z Zhu, X Zhou, L Wei, X Bai, Y Bai, C Han - Heliyon, 2023 - cell.com
Background: Encrypting plain images into noise-like cipher images is a common method in
image encryption. However, when noise-like images appear in public networks, they are …

Secure medical image steganography method based on pixels variance value and eight neighbors

MK Abed, MM Kareem, RK Ibrahim… - 2021 International …, 2021 - ieeexplore.ieee.org
The security aspect of processes and methodologies in the information and communication
technology era is the main part. The security of information should a key priority in the secret …

Randomization Strategies in Image Steganography Techniques: A Review.

AFM Abadin, R Sulaiman… - Computers, Materials & …, 2024 - search.ebscohost.com
Image steganography is one of the prominent technologies in data hiding standards.
Steganographic system performance mostly depends on the embedding strategy. Its goal is …

Local information pattern descriptor for corneal diseases diagnosis

SK Jameel, S Aydın, NH Ghaeb - 2021 - acikerisim.aksaray.edu.tr
Light penetrates the human eye through the cornea, which is the outer part of the eye, and
then the cornea directs it to the pupil to determine the amount of light that reaches the lens of …

Culture shaping and value realization of digital media art under Internet+

J Wang, J Yang - International Journal of System Assurance Engineering …, 2022 - Springer
This exploration aims to better realize the cultural shaping and the value of digital media art
under the background of Internet+. The security of digital media art information …

An efficient steganalysis of medical images by using deep learning based discrete scalable alex net convolutionary neural networks classifier

J Hemalatha, S Geetha, S Mohan… - Journal of Medical …, 2021 - ingentaconnect.com
Steganalysis is the technique that tries to beat steganography by detecting and removing
secret information. Steganalysis involves the detection of a message embedded in a picture …

An effective image steganography scheme based on least significant bits and cover image transportation

ALO Alrwegaoi - 2022 - openaccess.altinbas.edu.tr
In this era of information security and communication, a high priority is achieving a robust
and secure steganography scheme when considering information concealment. Developing …

[PDF][PDF] A Reversible Data Hiding Scheme with Security Enhancement Using a Secure Bit Selection Strategy for AMBTC-Compressed Images

ND Tuan - researchgate.net
Reversible Data Hiding (RDH) is an approach that has garnered significant attention from
researchers over the past two decades. In this paper, an Absolute Moment Block Truncation …

Improved Video Steganography for Secured Communication Using Clustering and Chaotic Mapping

LH Palivela, MR Sumalatha, A Naveen… - … Learning and Deep …, 2021 - taylorfrancis.com
The increased use of technology generates a huge volume of data in the forms of text, audio,
video, and images, among others. With the increasedgenerationofdata, the security and …