1,387 Hits in 4.1 sec

An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications

Romany F. Mansour, Elsaid M. Abdelrahim
2018 Multidimensional systems and signal processing  
Unlike traditional wavelet transform techniques, we incorporated Discrete Ripplet Transformation (DRT) technique for message embedding in the medical cover images.  ...  The performance assessment reveals that the proposed steganography model outperforms other wavelet transformation based approaches in terms of high PSNR, embedding capacity, imperceptibility etc.  ...  This is the matter of fact that a number of researches have been done to perform data embedding in images/medical image using steganography techniques; however most of the approaches use wavelet transform  ... 
doi:10.1007/s11045-018-0575-3 fatcat:gnam7q5uovhszhbhxl7rwoa4sy

Analysis of Secret Image Sharing using Shared Image

I. EdwinDayanand, R.K.Selva Kumar
2014 International Journal of Computer Applications  
Some effective techniques for handling large images as well as for enhancing security protection are employed.  ...  A secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants.  ...  The feasibility level of the secret Image sharing using shared Image (SSIS) technique is compared with an existing enhanced pixel wise masking, through optimal code, Reversible color transform.  ... 
doi:10.5120/18926-0283 fatcat:ghykmuk2mja6tisbww5n7hupqa

A Study of Data Security on E-Governance using Steganographic Optimization Algorithms

Sk Anamul Hoda, Dr. Abhoy Chand Mondal
2022 International Journal on Recent and Innovation Trends in Computing and Communication  
Various optimization techniques like particle swarm optimization and genetic algorithms with cryptography can be used to protect information for e-governance services.  ...  To deal with these cybercrimes we need optimized and advanced steganographic techniques.  ...  ACKNOWLEDGEMENTS This review work was supported and got technical help from the department of computer science, The University of Burdwan, West Bengal, India. We are especially thanks to Dr.  ... 
doi:10.17762/ijritcc.v10i5.5548 fatcat:vxojh7t5tnao7dhkntchh3uuja

Apply Bee Colony Optimization for Image Steganography with Optical Pixel Adjustment

Ibrahim Ahmed Saleh, et al.
2016 International Journal of Computing and Digital Systems  
The secret image is embedded using LSB algorithm then the BCO with Optimal Pixel Adjustment process (OPAP) algorithm is used to find the best block matching matrix and then find the optimal substitution  ...  The proposed technique uses Bee Colony Optimization (BCO) along with the wellknown Least Significant Bit (LSB) steganography algorithm.  ...  The transform domain techniques convert image into coefficient using (Fourier transform, DCT, wavelet, etc. ) 1.  ... 
doi:10.12785/ijcds/050505 fatcat:sk6zumyvcnejhdrv2c7plupf4q

Real Time Implementation of Stegofirewall System

Al-Sultan Muthana R. et. al.
2019 International Journal of Computing and Digital Systems  
The system implemented using Matlab together with Spartan 6 and Virtex 5 FPGA chips.  ...  The paper presents the design of a firewall system that passes the digital image files (the carrier cover) together with a watermarked image file and rejects the hidden content.  ...  SYSTEM SIMULATION AND EVALUATION The optimal stego image content destruction technique that adopts the Mean Filter has been implemented and simulated.  ... 
doi:10.12785/ijcds/080507 fatcat:3ebnee3chrbr3ausfyhspff7lu

Current status and key issues in image steganography: A survey

Mansi S. Subhedar, Vijay H. Mankar
2014 Computer Science Review  
This article provides a review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes.  ...  In addition, image quality metrics that can be used for evaluation of stego images and cover selection measures that provide additional security to embedding scheme are also highlighted.  ...  Not only the choice of transform but also the optimal data embedding locations affect the performance of the steganography system.  ... 
doi:10.1016/j.cosrev.2014.09.001 fatcat:vpvq6qozrrcvpfuhz73t26ma54

A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP)

Fariba GhorbanyBeram, Mashallah Abbasi Dezfouli, Mohammadi Hossein Yektaie
2014 International Journal of Computer Applications  
The system combines an float wavelet transform and the variable rate of embedding and embeds secret data in a random order using a secret key only known to both sender and receiver to maximize performance  ...  Steganography is the technique for hiding secret information in other data such as multimedia images, text, audio.  ...  and Optimal Coefficients Adjustment Process (OCAP).The system combines an float wavelet transform and the variable rate of embedding and embeds secret data in a random order using a secret key only known  ... 
doi:10.5120/15181-3528 fatcat:tboogcbgf5egzh6cjmadrd5rw4

Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems

Duraisamy Jude Hemanth, Subramaniyan Umamaheswari, Daniela Elena Popescu, Antoanela Naaji
2016 Open Physics  
Frequency domain transforms such as Bandelet Transform (BT) and Finite Ridgelet Transform (FRIT) are used in combination with GA and PSO to improve the efficiency of the image steganography system.  ...  These transform coefficients may not be optimal in terms of the stego image quality and embedding capacity.  ...  Conclusion In this paper, the frequency domain Steganography and optimization techniques are combined to design the efficiency improved steganography system.  ... 
doi:10.1515/phys-2016-0052 fatcat:u3wtv4vx2rcwjkpdhdnwdbaxwi

Nature Inspired Algorithm for Pixel Location Optimization in Video Steganography Using Deep RNN

Shamal Salunkhe, Surendra Bhosale
2022 International journal on engineering, science and technology  
The steganography is applied on text, image, video, and audio files. The steganography is useful for safe and secure data transmission.  ...  The proposed method gives enhanced performance, which is seen with the parameters, Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and Correlation Coefficient (CC) which defines image quality  ...  Patil Deemed to be University), where first author, Shamal Salunkhe is full time employee in the Department of Instrumentation Engineering and working part-time research scholar in Veermata Jijabai Technological  ... 
doi:10.46328/ijonest.67 fatcat:bim25n3p4veovln3xeuqlpwsya

LSB steganography strengthen footprint biometric template

Israa Mohammed Khudher
2021 Eastern-European Journal of Enterprise Technologies  
The system is constructed in a hybridization manner between image processing, steganography, and artificial intelligence techniques.  ...  The Least Significant Bit method transforms the foot template to a stego image and is stored on a stego visual database for further use.  ...  Additionally, big thanks to the volunteers who helped to collect the foot-tip images to construct the visual database.  ... 
doi:10.15587/1729-4061.2021.225371 fatcat:kqnj335ryrcebl3jc65jnn6api

A Hybrid Curvelet Transform and Genetic Algorithm for Image Steganography

Heba Mostafa, Ahmed Fouad, Ghada Sami
2017 International Journal of Advanced Computer Science and Applications  
In this paper, we present a new hybrid image steganography algorithm by combining two famous techniques which are curvelet transform and genetic algorithm GA.  ...  The proposed algorithm is called Hybrid Curvelet Transform and Genetic Algorithm for image steganography (HCTGA).  ...  Some filters are applied to the cover image as a preprocessing technique to remove the noise and enhance the quality of the images.  ... 
doi:10.14569/ijacsa.2017.080843 fatcat:4gfhczddkzdpnm64g3yyutxace

Enhanced Whale Optimization Algorithm and Wavelet Transform for Image Steganography

2019 Multimedia Research  
A method called image steganography is used, which assures security to the concealed communication and protection of the information.  ...  Hence, this paper presents an algorithm for image steganography by exploiting sparse representation, and a method called Enhanced Whale Optimization Algorithm (WOA) in order to effectual selection of the  ...  In image steganography, there are two techniques, such as spatial techniques and frequency-domain techniques correspondingly.  ... 
doi:10.46253/ fatcat:dqjan6rp3bhlxdtx4pcd7zyutu

A Proposed Novel Architecture for Information Hiding in Image Steganography by Using Genetic Algorithm and Cryptography

Pratiksha Sethi, V. Kapoor
2016 Procedia Computer Science  
For appealing the defence of data thrashing and communication over network, the anticipated system uses cryptographic algorithm along with Steganography.  ...  In the anticipated system, the file which we want to make protected is firstly compressed to shrink in size and then the compressed data is transformed into cipher text by using AES cryptographic algorithm  ...  In this work we will spotlight to build up a system, which uses both cryptography and steganography for better privacy and security.  ... 
doi:10.1016/j.procs.2016.05.127 fatcat:7corzb75bbhktm6dtg7k6wlcka


2020 International journal of engineering sciences & research technology  
The proposed system is tested on various inputs and results evaluated are compared with the existing system.  ...  The proposed system also uses Fibonacci series to evaluate the next pixel in which data is to be hidden. Data is hidden using DWT algorithm.  ...  In this paper we have used a new image steganography technique using Fast Fourier Transform on the cover image Then the secret image is embedded into the two components of the cover image formed after  ... 
doi:10.29121/ijesrt.v9.i9.2020.2 fatcat:ybdwvuftfrb3dmpbvrt72w3t6u

Review on secured data capabilities of cryptography, steganography, and watermarking domain

Farah Qasim Ahmed Al-Yousuf, Roshidi Din
2020 Indonesian Journal of Electrical Engineering and Computer Science  
This paper concludes that cryptography techniques could be utilized with steganography and watermarking in secured data domain to enhance the security mechanisms.</span>  ...  <span>Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information.  ...  ACKNOWLEDGEMENTS We would like to thank Dean, School of Computing, Universiti Utara Malaysia and director of Awang Had Saleh Graduation School (AHSGS) for their moral support to the achievement of this  ... 
doi:10.11591/ijeecs.v17.i2.pp1053-1058 fatcat:zug25t23hffk5f53wb2ev6rede
« Previous Showing results 1 — 15 out of 1,387 results