Journal ArticleDOI
Analysis of various data security techniques of steganography: A survey
Sachin Dhawan,Rashmi Gupta +1 more
Reads0
Chats0
TLDR
The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.Abstract:
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...read more
Citations
More filters
Journal ArticleDOI
SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT
TL;DR: In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Journal ArticleDOI
Security of medical images for telemedicine: a systematic review
TL;DR: In this article , the authors present a detailed discussion of different types of medical images and the attacks that may affect medical image transmission and present an in-depth overview of security techniques, such as cryptography, steganography, and watermarking.
Journal ArticleDOI
Multiple Zero-Watermarking of Medical Images for Internet of Medical Things
TL;DR: In this article , a fast multiple zero-watermarking method based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images is presented.
Journal ArticleDOI
Multiple Zero-Watermarking of Medical Images for Internet of Medical Things
TL;DR: Fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images are presented.
Journal ArticleDOI
Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems
TL;DR: An in-depth understanding is established of the impact of Cloud and Edge computing-based environmental factors on computer forensics and the various challenges for the digital forensics process.
References
More filters
Journal ArticleDOI
Image steganography in spatial domain: A survey
Mehdi Hussain,Mehdi Hussain,Ainuddin Wahid Abdul Wahab,Yamani Idna Bin Idris,Anthony T. S. Ho,Anthony T. S. Ho,Anthony T. S. Ho,Ki-Hyun Jung +7 more
TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Journal ArticleDOI
Current status and key issues in image steganography
TL;DR: A review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes, and current research trends and directions to improve on existing methods are suggested.
Journal ArticleDOI
A DWT Based Approach for Image Steganography
Po-Yueh Chen,Hung-Ju Lin +1 more
TL;DR: A new steganography technique which embeds the secret messages in frequency domain and keeps the messages away from stealing, destroying from unintended users on the inter- net and hence provide satisfactory security.
Journal ArticleDOI
Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research
TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Journal ArticleDOI
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security
Xinpeng Zhang,Shuozhong Wang +1 more
TL;DR: To enhance security, a modified scheme is proposed which avoids occurrence of the above-mentioned steps in the pixel difference histogram while preserving the advantage of low visual distortion of the PVD.