scispace - formally typeset
Journal ArticleDOI

Analysis of various data security techniques of steganography: A survey

Reads0
Chats0
TLDR
The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.
Abstract
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...

read more

Citations
More filters
Journal ArticleDOI

SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT

TL;DR: In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Journal ArticleDOI

Security of medical images for telemedicine: a systematic review

TL;DR: In this article , the authors present a detailed discussion of different types of medical images and the attacks that may affect medical image transmission and present an in-depth overview of security techniques, such as cryptography, steganography, and watermarking.
Journal ArticleDOI

Multiple Zero-Watermarking of Medical Images for Internet of Medical Things

- 01 Jan 2022 - 
TL;DR: In this article , a fast multiple zero-watermarking method based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images is presented.
Journal ArticleDOI

Multiple Zero-Watermarking of Medical Images for Internet of Medical Things

TL;DR: Fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images are presented.
Journal ArticleDOI

Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems

TL;DR: An in-depth understanding is established of the impact of Cloud and Edge computing-based environmental factors on computer forensics and the various challenges for the digital forensics process.
References
More filters
Journal ArticleDOI

A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement

TL;DR: A new data hiding method that increases visual quality and payload, as well as maintains steganographic security, is proposed that consists of two novel methods of parity-bit pixel value difference and improved rightmost digit replacement.
Journal ArticleDOI

Application of bit-plane decomposition steganography to JPEG2000 encoded images

TL;DR: The proposed method is based on a seamless integration of the two schemes without compromising their desirable features and makes feasible the deployment of the merits of a BPCS steganography technique in a practical scenario where images are compressed before being transmitted over the network.

A network of co-operative cameras for visual surveillance : Intelligent distributed surveillance systems

TL;DR: In this paper, a network of co-operative cameras for the visual surveillance of parking lots is presented, which employs multiple subnets able to manage static and active cameras in a hierarchical framework.
Journal ArticleDOI

A Novel DWT Based Image Securing Method Using Steganography

TL;DR: This work proposes a data securing technique that is used for hiding multiple color images into a single color image using the Discrete Wavelet Transform and has a less perceptible changes compared to the original image with high overall security.
Proceedings ArticleDOI

Performance evaluation parameters of image steganography techniques

TL;DR: The various performance evaluation parameters of image steganography techniques are illustrated with mathematical equations and some future directions are also highlighted at the end of the paper.
Related Papers (5)