Journal ArticleDOI
Analysis of various data security techniques of steganography: A survey
Sachin Dhawan,Rashmi Gupta +1 more
Reads0
Chats0
TLDR
The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.Abstract:
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...read more
Citations
More filters
Journal ArticleDOI
SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT
TL;DR: In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Journal ArticleDOI
Security of medical images for telemedicine: a systematic review
TL;DR: In this article , the authors present a detailed discussion of different types of medical images and the attacks that may affect medical image transmission and present an in-depth overview of security techniques, such as cryptography, steganography, and watermarking.
Journal ArticleDOI
Multiple Zero-Watermarking of Medical Images for Internet of Medical Things
TL;DR: In this article , a fast multiple zero-watermarking method based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images is presented.
Journal ArticleDOI
Multiple Zero-Watermarking of Medical Images for Internet of Medical Things
TL;DR: Fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images are presented.
Journal ArticleDOI
Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems
TL;DR: An in-depth understanding is established of the impact of Cloud and Edge computing-based environmental factors on computer forensics and the various challenges for the digital forensics process.
References
More filters
Journal ArticleDOI
Comprehensive survey of 3D image steganography techniques
Ashish Girdhar,Vijay Kumar +1 more
TL;DR: 3D image steganography techniques in all the three domains: geometrical, topological and representation domains have been studied and compared among each other on various parameters such as embedding capacity, reversibility and response towards attacks.
Journal ArticleDOI
A High-Capacity Steganography Scheme for JPEG2000 Baseline System
TL;DR: A high-capacity steganography scheme is proposed for the JPEG2000 baseline system, which uses bit-plane encoding procedure twice to solve the problem due to bitstream truncation, and embedding points and their intensity are determined in a well defined quantitative manner via redundancy evaluation to increase hiding capacity.
Journal ArticleDOI
An Efficient Embedder for BCH Coding for Steganography
TL;DR: The BCH syndrome coding for steganography is now viable ascribed to the reduced complexity and its simplicity of the proposed embedder.
Proceedings ArticleDOI
A New Image Steganography Technique
TL;DR: A more robust steganography technique is proposed that takes advantages of the strengths and limitations of the presented techniques and avoids the limitations.
Journal ArticleDOI
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography
TL;DR: Adaptive Batch size Image Merging steganographer, AdaBIM is introduced and mathematically prove it outperforms the state-of-the-art batch steganography method and further verify its superiority by experiments.