[PDF][PDF] A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN.

M Hashim, MS MOHD RAHIM… - Journal of Theoretical & …, 2018 - researchgate.net
Nowadays, information hiding is becoming a helpful technique and fetch more attention due
fast growth of using internet, it is applied for sending secret information by using different …

A steganography embedding method based on edge identification and XOR coding

H Al-Dmour, A Al-Ani - Expert systems with Applications, 2016 - Elsevier
In this paper, we present a novel image steganography algorithm that combines the
strengths of edge detection and XOR coding, to conceal a secret message either in the …

A systematic literature review on chaotic maps-based image security techniques

D Singh, S Kaur, M Kaur, S Singh, M Kaur… - Computer Science …, 2024 - Elsevier
Images play a substantial role in various applications such as medical imaging, satellite
imaging, and military communications. These images often contain confidential and …

[PDF][PDF] Image steganography using least significant bit and secret map techniques.

A ALabaichi, MAAK Al-Dabbas… - International journal of …, 2020 - researchgate.net
In steganography, secret data are invisible in cover media, such as text, audio, video and
image. Hence, attackers have no knowledge of the original message contained in the media …

[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …

Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System

V Barannik, Y Ryabukha, N Barannik… - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
Develloped a new approach of indirect steganographic embedding of data based on
modifications of the basis of the polyadic system. In comparison with other methods indirect …

High security data hiding using image cropping and LSB least significant bit steganography

KA Al-Afandy, OS Faragallah… - 2016 4th IEEE …, 2016 - ieeexplore.ieee.org
A high security data hiding approach using image cropping and Least Significant Bit (LSB)
steganography is proposed. The predefined certain secret coordinate crops are extracted …

Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid

T Rabie, M Baziyad, I Kamel - Multimedia Tools and Applications, 2018 - Springer
This paper introduces a high capacity image hiding scheme with enhanced stego image
quality. This new hiding scheme utilizes a multiscale Laplacian pyramid of the cover image …

A novel method for digital image steganography based on a new three-dimensional chaotic map

A Sharif, M Mollaeefar, M Nazari - Multimedia Tools and Applications, 2017 - Springer
This paper, presents a novel chaos-based image steganography algorithm. Because of
efficient property of chaos based security systems besides steganography applicability in …

A safe and secured medical textual information using an improved LSB image steganography

RO Ogundokun, OC Abikoye - International Journal of Digital …, 2021 - Wiley Online Library
Safe conveyance of medical data across unsecured networks nowadays is an essential
issue in telemedicine. With the exponential growth of multimedia technologies and …