scispace - formally typeset
Journal ArticleDOI

Analysis of various data security techniques of steganography: A survey

Reads0
Chats0
TLDR
The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.
Abstract
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...

read more

Citations
More filters
Journal ArticleDOI

SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT

TL;DR: In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Journal ArticleDOI

Security of medical images for telemedicine: a systematic review

TL;DR: In this article , the authors present a detailed discussion of different types of medical images and the attacks that may affect medical image transmission and present an in-depth overview of security techniques, such as cryptography, steganography, and watermarking.
Journal ArticleDOI

Multiple Zero-Watermarking of Medical Images for Internet of Medical Things

- 01 Jan 2022 - 
TL;DR: In this article , a fast multiple zero-watermarking method based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images is presented.
Journal ArticleDOI

Multiple Zero-Watermarking of Medical Images for Internet of Medical Things

TL;DR: Fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images are presented.
Journal ArticleDOI

Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems

TL;DR: An in-depth understanding is established of the impact of Cloud and Edge computing-based environmental factors on computer forensics and the various challenges for the digital forensics process.
References
More filters
Journal ArticleDOI

Image steganography in spatial domain: A survey

TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Journal ArticleDOI

Current status and key issues in image steganography

TL;DR: A review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes, and current research trends and directions to improve on existing methods are suggested.
Journal ArticleDOI

A DWT Based Approach for Image Steganography

TL;DR: A new steganography technique which embeds the secret messages in frequency domain and keeps the messages away from stealing, destroying from unintended users on the inter- net and hence provide satisfactory security.
Journal ArticleDOI

Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research

TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
Journal ArticleDOI

Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security

TL;DR: To enhance security, a modified scheme is proposed which avoids occurrence of the above-mentioned steps in the pixel difference histogram while preserving the advantage of low visual distortion of the PVD.
Related Papers (5)