A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform

T Mahmood, Z Mehmood, M Shah, T Saba - Journal of Visual …, 2018 - Elsevier
In this era, due to the widespread availability of digital devices, various open source and
commercially available image editing tools have made authenticity of image contents …

Data hiding technique in steganography for information security using number theory

A Rehman, T Saba, T Mahmood… - Journal of …, 2019 - journals.sagepub.com
In the current era, due to the widespread availability of the Internet, it is extremely easy for
people to communicate and share multimedia contents with each other. However, at the …

An improved image steganography technique based on MSB using bit differencing

AU Islam, F Khalid, M Shah, Z Khan… - 2016 Sixth …, 2016 - ieeexplore.ieee.org
The rapid development of data communication in modern era demands secure exchange of
information. Steganography is an established method for hiding data from an unauthorised …

Efficient lossless compression based reversible data hiding using multilayered n‐bit localization

R Abbasi, L Xu, F Amin, B Luo - Security and communication …, 2019 - Wiley Online Library
We proposed an innovative reversible data hiding technique that is formulated on histogram
shifting by using multilayer localized n‐bit truncation image (LBPTI), namely, generated form …

A passive technique for detecting copy-move forgeries by image feature matching

T Mahmood, M Shah, J Rashid, T Saba… - Multimedia Tools and …, 2020 - Springer
Due to the recent evolutions in the technologies various digital devices and image
processing tools are available in the market. Consequently, crime rates are also proliferating …

LSB image steganography based on blocks matrix determinant method

D Shehzad, T Dag - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
Image steganography is one of the key types of steganography where a message to be sent
is hidden inside the cover image. The most commonly used techniques for image …

A new symmetric key encryption algorithm using images as secret keys

M Islam, M Shah, Z Khan, T Mahmood… - … on Frontiers of …, 2015 - ieeexplore.ieee.org
Symmetric key cryptography is a common cryptographic technique using the same key at
both the transmitter and receiver side. The main advantage of symmetric key encryption is its …

An efficient forensic approach for copy-move forgery detection via discrete wavelet transform

R Ashraf, MS Mehmood, T Mahmood… - … on Cyber Warfare …, 2020 - ieeexplore.ieee.org
In this modern era, due to advancements in image processing applications; image forgery
can be easily performed and difficult to locate by the bare eye. Therefore, the digital images …

[HTML][HTML] Enhanced payload volume in the least significant bits image steganography using hash function

YY Ghadi, T AlShloul, ZI Nezami, H Ali, M Asif… - PeerJ Computer …, 2023 - peerj.com
The art of message masking is called steganography. Steganography keeps communication
from being seen by any other person. In the domain of information concealment within …

PDA: A private domains approach for improved msb steganography image

SIM Ali, MG Ali, LAZ Qudr - Periodicals of Engineering and Natural …, 2019 - pen.ius.edu.ba
Steganography is one of the secure techniques of protecting data inside a cover object.
Images are the most popular cover objects for Steganography. It provides secret message …