High capacity reversible steganography in encrypted images based on feature mining in plaintext domain

Z Yin, W Hong, J Tang, B Luo - International Journal of …, 2016 - inderscienceonline.com
A reversible steganographic scheme in encrypted images with high capacity based on
feature mining in plaintext domain is proposed in this paper. Two techniques are used: multi …

Multi-keywords carrier-free text steganography method based on Chinese pinyin

Y Liu, J Wu, G Xin - International Journal of Computational …, 2020 - inderscienceonline.com
By combining big data with the characteristics of steganography, carrier-free steganography
was proposed to resist all the steganalysis attacks. A novel method named multi-keywords …

Reversible data hiding methods in integer wavelet transform

AM Kapadia, N Pandian - International Journal of …, 2020 - inderscienceonline.com
Reversible data hiding is art of concealing secret information such that cover media and
secret information are both recovered without any information loss. In this paper high …

Effect of trigonometric functions-based watermarking on blood vessel extraction: an application in ophthalmology imaging

N Dey, SS Ahmed, S Chakraborty… - International …, 2017 - inderscienceonline.com
With the growth of globalisation, security has been a major concern in digital exchange of
medical information. Data hiding, also referred as watermarking, was introduced to …

An enhanced reversible image steganography using distributive Tian's method

N Malarvizhi, R Priya, R Bhavani - Security and Privacy, 2023 - Wiley Online Library
In recent years, the concept of image encryption and data concealing has become a major
area of research that significantly improves the secure communication of images with hidden …

[PDF][PDF] An Image steganography algorithm using huffman and interpixel difference encoding

N Pandian - International Journal of Computer Science & Security, 2014 - Citeseer
Steganography is an art of hiding secret information on a cover medium through
imperceptible methodology. The three pillars on which a steganography algorithm should be …

A robust video watermarking scheme using sparse principal component analysis and wavelet transform

T Shankar, G Yamuna - International Journal of …, 2017 - inderscienceonline.com
The extension of internet facility profoundly eases the dissemination of all digital data such
as audio, images and videos to the general public. This paper proposes a blind scheme for …

[PDF][PDF] Performance Analysis of Open-Source Image Steganography Tools

U Pilania, R Tanwar, P Gupta - Journal of Engineering and Applied …, 2021 - m.mu.edu.sa
In the present epoch, where technology is rising fast with new developments, the main
challenge for the sender is to ensure that information is sent in a correct and covert mode …

Two image encryption methods with hiding effect based on moiré pattern

Q Gao, Z Han, Y He, D Wang - International Journal of High …, 2016 - inderscienceonline.com
In the existing methods of image encryption based on moiré phase modulation, the
superposed moiré pattern can be reconstructed periodically, but the deformed layer leaks …

Turtle-shell data embedding method with high image fidelity

GH Qiu, CF Lee, CC Chang - International Journal of …, 2021 - inderscienceonline.com
In this paper, a modified version of the turtle-shell data hiding (TDH) scheme is proposed,
aiming at improving the quality of stego-image. TDH scheme was first proposed by Chang et …