PSNR vs SSIM: imperceptibility quality assessment for image steganography

DRIM Setiadi - Multimedia Tools and Applications, 2021 - Springer
Peak signal to noise ratio (PSNR) and structural index similarity (SSIM) are two measuring
tools that are widely used in image quality assessment. Especially in the steganography …

An imperceptible LSB image hiding on edge region using DES encryption

EJ Kusuma, OR Indriani, CA Sari… - … on Innovative and …, 2017 - ieeexplore.ieee.org
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus,
due to reducing the risk, data security techniques should be implemented. Data security …

Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5)

RD Ardy, OR Indriani, CA Sari… - … Conference on Smart …, 2017 - ieeexplore.ieee.org
Authentication of digital media has been done with the various scheme, one of them is a
digital signature. The main reason the technique of digital signature appears on the …

Robust and imperceptible image watermarking technique based on SVD, DCT, BEMD and PSO in wavelet domain

Laxmanika, PK Singh - Multimedia Tools and Applications, 2022 - Springer
This article introduces a robust image watermarking primarily founded on DWT (discrete
wavelet transform), BEMD (bi-dimensional empirical mode decomposition), DCT (discrete …

Adaptive LSB quantum image watermarking algorithm based on Haar wavelet transforms

Y Yu, J Gao, X Mu, S Wang - Quantum Information Processing, 2023 - Springer
In this paper, a novel scheme for quantum image watermarking based on novel enhanced
quantum representation of digital images (NEQR) is proposed which can embed a 2 n-1× 2 …

Rdh-des: Reversible data hiding over distributed encrypted-image servers based on secret sharing

L Xiong, X Han, CN Yang, Z Xia - ACM Transactions on Multimedia …, 2023 - dl.acm.org
Reversible Data Hiding in Encrypted Image (RDHEI) schemes may redistribute the data
hiding procedure to other parties and can preserve privacy of the cover image. Recently …

Design and implementation of AES and SHA-256 cryptography for securing multimedia file over android chat application

NA Fauziah, EH Rachmawanto… - … International Seminar on …, 2018 - ieeexplore.ieee.org
In the current era of globalization, security is one of the most important aspects in the
development of communication applications, especially when sending confidential files …

Securing and hiding secret message in image using xor transposition encryption and LSB method

A Setyono - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
The popular LSB technique is used in steganography techniques on spatial domains. This
technique has many advantages in terms of imperceptibility and payload. Except in the case …

Imperceptible and secure image watermarking using DCT and random spread technique

EH Rachmawanto, CA Sari… - … Electronics and Control), 2019 - telkomnika.uad.ac.id
Watermarking is a copyright protection technique, while cryptography is a message
encoding technique. Imperceptibility, robustness, and safety are aspects that are often …

Image watermarking using triple transform (DCT-DWT-SVD) to improve copyright protection performance

AA Arrasyid, MA Soeleman, CA Sari… - … seminar on research …, 2018 - ieeexplore.ieee.org
One popular security technique used to protect copyright ownership in digital images is
image watermarking. Discrete Cosine Transform (DCT) and Discrete Wavelet Transform …