Analysis of various data security techniques of steganography: A survey
Citations
45 citations
16 citations
12 citations
10 citations
7 citations
References
[...]
3,027 citations
"Analysis of various data security t..." refers methods in this paper
...Mirjalili et al. (2017) proposed the salp swarm optimization algorithm and multi-objective salp swarm optimization algorithm for giving the optimized result for many mathematical functions....
[...]
...As per the analysis of the survey, there is further scope of improvement in steganography by combining the techniques of Liao et al. (2017) and Mirjalili et al. (2017), which can give improved adaptive embedding based on the salp swarm optimization algorithm....
[...]
2,603 citations
"Analysis of various data security t..." refers methods in this paper
...The steganography procedure likewise utilizes curvelet changes (Candès et al., 2006) to conceal mystery data into their ECG signal....
[...]
...The least significant bit shows the detailed analysis in Chandramouli and Memon (2001) and Al-Omari and Al-Taani (2017) and gives a more secure and robust method of LSB steganography for colored images....
[...]
2,561 citations
"Analysis of various data security t..." refers background or methods in this paper
...(Petitcolas et al., 1999) This paper gave an outline of data stowing away and also described the no. of attacks on different steganographic techniques and the various techniques but cannot give the comparisons between them and any future recommendations on steganography....
[...]
...For the solution of safety and security of communicating data, there are two processes, one is steganography and other is cryptography (Petitcolas et al., 1999) Cryptography is the technique that transfers the data in coded form, in which only the sender and receiver are aware of the key of encoded…...
[...]
...In this, a Secret message is installed in an authorized carrier in such a way that it is not recognizable for the intruder (Petitcolas et al., 1999)....
[...]
1,812 citations
"Analysis of various data security t..." refers methods in this paper
...…available on steganography which gives a more robust steganographic video algorithm (Mstafa et al., 2017) based on DCT and DWT domains dependent on the algorithm of Moving item Tracking given by Ma et al. (2015) work for the improvement of accuracy of tracking and visual tracking and robustness....
[...]
1,572 citations
"Analysis of various data security t..." refers methods in this paper
...References Work and their limitations (Cheddad et al., 2010b) This paper gives only an audit and examination of some existing techniques for steganography alongside some regular measures and rules drawn from the literature....
[...]