Image watermarking between conventional and learning-based techniques: a literature review

S Boujerfaoui, R Riad, H Douzi, F Ros, R Harba - Electronics, 2022 - mdpi.com
Currently, most transactions and exchanges are conducted through the Internet thanks to
technological tools, running the risk of the falsification and distortion of information. This is …

[PDF][PDF] An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection

J Jumanto - Cybernetics and information technologies, 2018 - sciendo.com
The Internet is a public network with many issues of data transfer security. Steganography is
a data transmission security technique that is done by hiding the message in a container …

An imperceptible LSB image hiding on edge region using DES encryption

EJ Kusuma, OR Indriani, CA Sari… - … on Innovative and …, 2017 - ieeexplore.ieee.org
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus,
due to reducing the risk, data security techniques should be implemented. Data security …

A good performance OTP encryption image based on DCT-DWT steganography

WS Sari, EH Rachmawanto… - … Electronics and Control), 2017 - telkomnika.uad.ac.id
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed …

A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size

EH Rachmawanto, CA Sari - 2017 International Seminar on …, 2017 - ieeexplore.ieee.org
Many people have used the internet in daily communication. The rise of internet data theft
makes the security of data transmission becomes very important. Cryptography and …

Hiding and securing message on edge areas of image using LSB steganography and OTP encryption

C Irawan, CA Sari… - 2017 1st International …, 2017 - ieeexplore.ieee.org
Imperceptibility and security are the two most important things in StegoCrypt techniques. In
this paper, we have proposed the technique of inserting messages to the edge of the image …

Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm

G Ardiansyah, CA Sari… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Public networks such as the Internet are becoming more sophisticated, faster, and cheaper,
so that more and more used for information exchange. This may increase the likelihood of …

A secure image watermarking using Chinese remainder theorem based on haar wavelet transform

U Sudibyo, F Eranisa… - 2017 4th International …, 2017 - ieeexplore.ieee.org
This study proposed concealment of information through watermarking techniques using a
combination of Haar Wavelet Transform (HWT) and Chinese Remainder Theorem (CRT) …

Teknik penyembunyian dan enkripsi pesan pada citra digital dengan kombinasi metode LSB dan RSA

AE Handoyo, EH Rachmawanto… - Jurnal Teknologi dan …, 2018 - jtsiskom.undip.ac.id
This study proposed a combination of steganography and cryptography techniques using
LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to …

Image watermarking using low wavelet subband based on 8× 8 sub-block DCT

A Winarno, AA Arrasyid, CA Sari… - … on Application for …, 2017 - ieeexplore.ieee.org
Currently, digital image watermarking is widely implemented as a tool for copyright
protection. Along with technological developments, the technique of theft and manipulation …