scispace - formally typeset
Journal ArticleDOI

Analysis of various data security techniques of steganography: A survey

Reads0
Chats0
TLDR
The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.
Abstract
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...

read more

Citations
More filters
Journal ArticleDOI

SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT

TL;DR: In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Journal ArticleDOI

Security of medical images for telemedicine: a systematic review

TL;DR: In this article , the authors present a detailed discussion of different types of medical images and the attacks that may affect medical image transmission and present an in-depth overview of security techniques, such as cryptography, steganography, and watermarking.
Journal ArticleDOI

Multiple Zero-Watermarking of Medical Images for Internet of Medical Things

- 01 Jan 2022 - 
TL;DR: In this article , a fast multiple zero-watermarking method based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images is presented.
Journal ArticleDOI

Multiple Zero-Watermarking of Medical Images for Internet of Medical Things

TL;DR: Fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images are presented.
Journal ArticleDOI

Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems

TL;DR: An in-depth understanding is established of the impact of Cloud and Edge computing-based environmental factors on computer forensics and the various challenges for the digital forensics process.
References
More filters
Journal ArticleDOI

Comprehensive survey of 3D image steganography techniques

TL;DR: 3D image steganography techniques in all the three domains: geometrical, topological and representation domains have been studied and compared among each other on various parameters such as embedding capacity, reversibility and response towards attacks.
Journal ArticleDOI

A High-Capacity Steganography Scheme for JPEG2000 Baseline System

TL;DR: A high-capacity steganography scheme is proposed for the JPEG2000 baseline system, which uses bit-plane encoding procedure twice to solve the problem due to bitstream truncation, and embedding points and their intensity are determined in a well defined quantitative manner via redundancy evaluation to increase hiding capacity.
Journal ArticleDOI

An Efficient Embedder for BCH Coding for Steganography

TL;DR: The BCH syndrome coding for steganography is now viable ascribed to the reduced complexity and its simplicity of the proposed embedder.
Proceedings ArticleDOI

A New Image Steganography Technique

TL;DR: A more robust steganography technique is proposed that takes advantages of the strengths and limitations of the presented techniques and avoids the limitations.
Journal ArticleDOI

Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography

TL;DR: Adaptive Batch size Image Merging steganographer, AdaBIM is introduced and mathematically prove it outperforms the state-of-the-art batch steganography method and further verify its superiority by experiments.
Related Papers (5)