Image steganography approaches and their detection strategies: A survey

MH Kombrink, ZJMH Geradts, M Worring - ACM Computing Surveys, 2024 - dl.acm.org
Steganography is the art and science of hidden (or covered) communication. In digital
steganography, the bits of image, video, audio and text files are tweaked to represent the …

Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …

[HTML][HTML] Securing matrix counting-based secret-sharing involving crypto steganography

F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever,
especially with our growing dependence on online services and the transfer of information …

Increasing participants using counting-based secret sharing via involving matrices and practical steganography

F Al-Shaarani, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Secret sharing is an approach for accessing sensitive information by several authorized
participants. It shares the secret key in different forms among several authorized participants …

Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique

M Kumar, A Soni, ARS Shekhawat… - … conference on artificial …, 2022 - ieeexplore.ieee.org
In the present innovation, for the trading of information, the internet is the most well-known
and significant medium. With the progression of the web and data innovation, computerized …

A novel approach using steganography and cryptography in business intelligence

S Pramanik, R Ghosh, MM Ghonge… - … for Analytics, Business …, 2021 - igi-global.com
In the information technology community, communication is a vital issue. And image transfer
creates a major role in the communication of data through various insecure channels …

A survey on AWS cloud computing security challenges & solutions

S Mishra, M Kumar, N Singh… - 2022 6th International …, 2022 - ieeexplore.ieee.org
Amazon offers a comprehensive range of IT solutions to let businesses construct their
private virtual clouds and maintain total control over their infrastructure. It is possible to use …

High performance image steganography integrating IWT and Hamming code within secret sharing

Z Saeidi, A Yazdi, S Mashhadi, M Hadian… - IET Image …, 2024 - Wiley Online Library
Steganography and secret sharing are schemes to increase the security of private
information against attackers. Steganography emphasizes secrecy while secret sharing …

Data encryption & decryption using steganography

N Manohar, PV Kumar - 2020 4th international conference on …, 2020 - ieeexplore.ieee.org
Video steganography is a method that processes secure communication. When we see the
history of steganography, it was hidden in many ways such as tablets covered with wax, & …

A review of steganography techniques

AM Khalaf, K Lakhtaria - AIP Conference Proceedings, 2024 - pubs.aip.org
Due to the importance, security, confidentiality, privacy, and progress of information at
present due to the development in the field of information technology, sharing this …