Journal ArticleDOI
Analysis of various data security techniques of steganography: A survey
Sachin Dhawan,Rashmi Gupta +1 more
Reads0
Chats0
TLDR
The objective of the paper is to examine and scrutinize the different algorithms of steganography based on parameters like PSNR, MSE, and Robustness and make recommendations for producing high-quality stego images, high-payload capacity, and robust techniques of Steganography.Abstract:
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet. Everyone needs th...read more
Citations
More filters
Journal ArticleDOI
SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT
TL;DR: In this article, the authors proposed an image steganography procedure by utilizing the combination of various algorithms that build the security of the secret data by utilizing Binary bit-plane decomposition (BBPD) based image encryption technique.
Journal ArticleDOI
Security of medical images for telemedicine: a systematic review
TL;DR: In this article , the authors present a detailed discussion of different types of medical images and the attacks that may affect medical image transmission and present an in-depth overview of security techniques, such as cryptography, steganography, and watermarking.
Journal ArticleDOI
Multiple Zero-Watermarking of Medical Images for Internet of Medical Things
TL;DR: In this article , a fast multiple zero-watermarking method based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images is presented.
Journal ArticleDOI
Multiple Zero-Watermarking of Medical Images for Internet of Medical Things
TL;DR: Fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications without deforming the original medical images are presented.
Journal ArticleDOI
Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems
TL;DR: An in-depth understanding is established of the impact of Cloud and Edge computing-based environmental factors on computer forensics and the various challenges for the digital forensics process.
References
More filters
Journal ArticleDOI
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
TL;DR: A new data hiding method that increases visual quality and payload, as well as maintains steganographic security, is proposed that consists of two novel methods of parity-bit pixel value difference and improved rightmost digit replacement.
Journal ArticleDOI
Application of bit-plane decomposition steganography to JPEG2000 encoded images
TL;DR: The proposed method is based on a seamless integration of the two schemes without compromising their desirable features and makes feasible the deployment of the merits of a BPCS steganography technique in a practical scenario where images are compressed before being transmitted over the network.
A network of co-operative cameras for visual surveillance : Intelligent distributed surveillance systems
TL;DR: In this paper, a network of co-operative cameras for the visual surveillance of parking lots is presented, which employs multiple subnets able to manage static and active cameras in a hierarchical framework.
Journal ArticleDOI
A Novel DWT Based Image Securing Method Using Steganography
TL;DR: This work proposes a data securing technique that is used for hiding multiple color images into a single color image using the Discrete Wavelet Transform and has a less perceptible changes compared to the original image with high overall security.
Proceedings ArticleDOI
Performance evaluation parameters of image steganography techniques
TL;DR: The various performance evaluation parameters of image steganography techniques are illustrated with mathematical equations and some future directions are also highlighted at the end of the paper.