An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography

MR Islam, A Siddiqa, MP Uddin… - … , Electronics & Vision …, 2014 - ieeexplore.ieee.org
In Steganography, the total message will be invisible into a cover media such as text, audio,
video, and image in which attackers don't have any idea about the original message that the …

A secure and high capacity image steganography technique

UD Acharya, PR Kamath - arXiv preprint arXiv:1304.3629, 2013 - arxiv.org
Steganography is the science of invisible communication. The purpose of Steganography is
to maintain secret communication between two parties. The secret information can be …

A secure color image steganography in transform domain

UD Acharya, PR Kamath - arXiv preprint arXiv:1304.3313, 2013 - arxiv.org
Steganography is the art and science of covert communication. The secret information can
be concealed in content such as image, audio, or video. This paper provides a novel image …

A novel secure communication protocol combining steganography and cryptography

S Song, J Zhang, X Liao, J Du, Q Wen - Procedia Engineering, 2011 - Elsevier
In this paper, a new secure communication protocol that combines steganography and
cryptography techniques organically is proposed. It is based on the LSB matching method …

Color image steganography in YCbCr space

ZA Alwan, HM Farhan… - International Journal of …, 2020 - search.proquest.com
Steganography is a best method for in secret communicating information during the
transference of data. Images are an appropriate method that used in steganography can be …

Image steganography: 2-bit XOR algorithm used in YCbCr color model with crypto-algorithm

D Madhu, S Vasuhi - 2020 4th International Conference on …, 2020 - ieeexplore.ieee.org
Steganography is a study of invisible communication that typically addresses how the
message is concealed. Protection is required when we want to send data across any …

Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains

S Hemalatha, UD Acharya, A Renuka - arXiv preprint arXiv:1307.3026, 2013 - arxiv.org
Steganography is one of the methods used for secret communication. Steganography
attempts to hide the existence of the information. The object used to hide the secret …

[PDF][PDF] A modified filtering approach of LSB image steganography using stream builder along with AES encryption

S Sultana, A Khanam, MR Islam, AM Nitu… - HBRP recent trends …, 2018 - researchgate.net
In information hiding context, steganography is a technique where the concealment of
information into a cover is performed in such a way that no one can easily detect the …

Modeling of environmental impact assessment of Kolaghat thermal power plant area, West Bengal, using remote sensing and GIS techniques

I Mondal, S Maity, B Das, J Bandyopadhyay… - Modeling Earth Systems …, 2016 - Springer
Abstract The Kolaghat Thermal Power Plant is a major Thermal Power Plant in West Bengal,
India. It is located at Mecheda (approx.) and 55 km from Kolkata. It is situated on the right site …

Authentication through Hough transformation generated signature on G-Let D3 Domain (AHSG)

M Sengupta, JK Mandal - Procedia Technology, 2013 - Elsevier
In this paper a G-Let based authentication technique has been proposed to authenticate
digital documents through Hough transform generated signature generated from original …