[HTML][HTML] SABMIS: sparse approximation based blind multi-image steganography scheme

R Agrawal, K Ahuja, MC Steinbach, T Wick - PeerJ Computer Science, 2022 - peerj.com
We hide grayscale secret images into a grayscale cover image, which is considered to be a
challenging steganography problem. Our goal is to develop a steganography scheme with …

Protecting Data by Socket Programming Steganography

WT Handoko, E Ardhianto, K Hadiono… - IOP Conference Series …, 2020 - iopscience.iop.org
This paper aims to observe the techniques and methods of securing data using socket
programming steganography. This work observes the development of the art of …

A Comparative Experiment of Document Security Level on Parallel Encryption With Digit Arithmetic of Covertext and Parallel Encryption using Covertext

E Ardhianto, W Budiharto, Y Heryadi… - 2021 IEEE 19th …, 2021 - ieeexplore.ieee.org
Documents for some entities contain important information. Cryptography and
steganography are a mechanism that is often used to maintain confidentiality. Parallel …

[DOC][DOC] Image Steganography With GUI in Matlab

I Ahsan, M Bilal - researchgate.net
This project deals with learning about the various types of steganography available. Image
steganography is performed for images and the concerning data is also decrypted to retrieve …

REVIEW PERKEMBANGAN TEKNIK STEGANOGRAFI DALAM LAPISAN JARINGAN KOMPUTER

E Ardhianto, WT Handoko, E Supriyanto - Dinamik, 2019 - unisbank.ac.id
Proses kriptografi masih sering dikombinasikan dengan steganografi dalam mekanisme
pengamanan data dan penyembunyian data. Pengamanan data ini tidak hanya dilakukan …