SE Naffouti, A Kricha, A Sakly - The Visual Computer, 2023 - Springer
Digital watermarking has attracted increasing attentions as it has been the current solution to copyright protection and content authentication in today's digital transformation, which has …
SD Kosuru, A Pradhan, KA Basith, R Sonar… - IEEE …, 2023 - ieeexplore.ieee.org
The hiding capacity (HC), imperceptibility, and security are the 3 important quality measures for a steganography technique. While the stego-image is on transit on the internet, the …
Information hiding is the most interesting and prominent field of data security. With the evolution of computational infrastructure, covert communication techniques have received …
Data hiding is an important research topic over the years. The PVD based techniques embed secret data into the cover image on the difference between the two neighboring …
AG Chefranov, G Öz - Journal of Information Security and Applications, 2022 - Elsevier
A new irreversible data hiding spatial domain method, A 2 MLSB, adaptive to pixel value (PV) and pixel value difference (PVD) using variable threshold on PV and PVD ranges, and …
DB Khadse, G Swain - Arabian Journal for Science and Engineering, 2023 - Springer
The three important quality aspects of image steganography mechanisms are hiding capacity (HC), peak signal-to-noise ratio (PSNR), and attack resistance. While the stego …
R Punia, A Malik, S Singh - Discover Internet of Things, 2023 - Springer
The exponential growth of the Internet of Things (IoT) has led to an increased demand for secure and efficient data transmission methods. However, there is a tradeoff in the image …
Steganography algorithms hide the secret message in the cover image and provide imperceptibility to the attacker. The Least Significant Bit (LSB) algorithm is the preferred data …
R Sonar, G Swain - Information Security Journal: A Global …, 2022 - Taylor & Francis
Pixel value differencing (PVD) steganography techniques suffer with “fall off boundary problem,” and adaptive PVD (APVD) steganography techniques suffer with “unused blocks” …