Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security

A Yang, Y Bai, T Xue, Y Li, J Li - Future Generation Computer Systems, 2023 - Elsevier
As an important technology in the field of cyberspace security, image steganography is of
great strategic significance to the research of image steganography. With the wider …

Hiding text using the least significant bit technique to improve cover image in the steganography system

EHJ Halboos, AM Albakry - Bulletin of Electrical Engineering and …, 2022 - beei.org
One of the highest priorities in the era of information technology is to achieve an accurate
and effective system for hiding security data. One of the goals of steganography is …

Chaotic based image steganography using polygonal method

D Dey, S Pattanayak, S Samanta - Nonlinear Dynamics and Applications …, 2022 - Springer
Abstract Information security is the most concerning factor in the time of tremendous
innovative headway. Immense specialized information cleared a way for the development of …

Enhancing Medical Domain Data Security using Inbuilt Data Encryption and Steganography

T Modi, J Patel, M Paliwal, K Shah… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The medical domain has seen an increased use of image steganography and encryption for
securing medical pictures and data. Image steganography is the procedure of hiding a text …

Integrated Approaches to Steganography: Embedding Static Information Across Audio, Visual, and Textual Formats

O Allasasmh, DA Laila, M Aljaidi… - 2024 International …, 2024 - ieeexplore.ieee.org
We need rapid, easy, and secure entails to send sensitive data over the Internet without
being discovered and retrieved by, an attacker, especially with the daily rise in electronic …

DNA-Based Secure Image Transmission Framework Using Encryption and LSB Steganography

KPB Madavi, KK Sowjanya - … Healthcare: AI Integration with IoT for …, 2024 - Springer
In the modern healthcare system, securing patients' sensitive data is essential. To safeguard
the patient's sensitive data in the interconnected healthcare system, various encryption …

[PDF][PDF] Designing and implementing an information steganography system for transmitting encrypted text messages in digital images

AS Kahlaf, AMS Rahma, A Ghandour - Al-Salam Journal for Engineering and …, 2024 - iasj.net
This danger can undoubtedly be eliminated using cryptography and steganography. And
Combining encryption with steganography can assist in achieving high levels of data …

A Modified Least Significant Bit Replacement: Steganography Method for Handling Random Noise Effect

M Usman, B Yusuf - IPS Journal of Physical Sciences, 2022 - journals.ipsintelligentsia.com
Steganography is one of the security measures employed at file level to cover information in
a carrier. The goal of steganography is to send a confidential message over a network in a …

[PDF][PDF] Implementing Image Steganography Techniques for Secure Data Hiding in the Development of an Android Application

AO Akinwumi, OL Ogbeide, DF Folorunso - researchgate.net
The rapid advancement of information and communication technology (ICT) has
revolutionized communication and streamlined various tasks. With the widespread use of …