A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications
2018
Multidimensional systems and signal processing
Unlike traditional wavelet transform techniques, we incorporated Discrete Ripplet Transformation (DRT) technique for message embedding in the medical cover images. ...
The performance assessment reveals that the proposed steganography model outperforms other wavelet transformation based approaches in terms of high PSNR, embedding capacity, imperceptibility etc. ...
This is the matter of fact that a number of researches have been done to perform data embedding in images/medical image using steganography techniques; however most of the approaches use wavelet transform ...
doi:10.1007/s11045-018-0575-3
fatcat:gnam7q5uovhszhbhxl7rwoa4sy
Analysis of Secret Image Sharing using Shared Image
2014
International Journal of Computer Applications
Some effective techniques for handling large images as well as for enhancing security protection are employed. ...
A secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. ...
The
feasibility level of the secret Image sharing using shared
Image (SSIS) technique is compared with an existing
enhanced pixel wise masking, through optimal code,
Reversible color transform. ...
doi:10.5120/18926-0283
fatcat:ghykmuk2mja6tisbww5n7hupqa
A Study of Data Security on E-Governance using Steganographic Optimization Algorithms
2022
International Journal on Recent and Innovation Trends in Computing and Communication
Various optimization techniques like particle swarm optimization and genetic algorithms with cryptography can be used to protect information for e-governance services. ...
To deal with these cybercrimes we need optimized and advanced steganographic techniques. ...
ACKNOWLEDGEMENTS This review work was supported and got technical help from the department of computer science, The University of Burdwan, West Bengal, India. We are especially thanks to Dr. ...
doi:10.17762/ijritcc.v10i5.5548
fatcat:vxojh7t5tnao7dhkntchh3uuja
Apply Bee Colony Optimization for Image Steganography with Optical Pixel Adjustment
2016
International Journal of Computing and Digital Systems
The secret image is embedded using LSB algorithm then the BCO with Optimal Pixel Adjustment process (OPAP) algorithm is used to find the best block matching matrix and then find the optimal substitution ...
The proposed technique uses Bee Colony Optimization (BCO) along with the wellknown Least Significant Bit (LSB) steganography algorithm. ...
The transform domain techniques convert image into coefficient using (Fourier transform, DCT, wavelet, etc. )
http://journals.uob.edu.bh 1. ...
doi:10.12785/ijcds/050505
fatcat:sk6zumyvcnejhdrv2c7plupf4q
Real Time Implementation of Stegofirewall System
2019
International Journal of Computing and Digital Systems
The system implemented using Matlab together with Spartan 6 and Virtex 5 FPGA chips. ...
The paper presents the design of a firewall system that passes the digital image files (the carrier cover) together with a watermarked image file and rejects the hidden content. ...
SYSTEM SIMULATION AND EVALUATION The optimal stego image content destruction technique that adopts the Mean Filter has been implemented and simulated. ...
doi:10.12785/ijcds/080507
fatcat:3ebnee3chrbr3ausfyhspff7lu
Current status and key issues in image steganography: A survey
2014
Computer Science Review
This article provides a review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes. ...
In addition, image quality metrics that can be used for evaluation of stego images and cover selection measures that provide additional security to embedding scheme are also highlighted. ...
Not only the choice of transform but also the optimal data embedding locations affect the performance of the steganography system. ...
doi:10.1016/j.cosrev.2014.09.001
fatcat:vpvq6qozrrcvpfuhz73t26ma54
A New Steganography Method based on Optimal Coefficients Adjustment Process (OCAP)
2014
International Journal of Computer Applications
The system combines an float wavelet transform and the variable rate of embedding and embeds secret data in a random order using a secret key only known to both sender and receiver to maximize performance ...
Steganography is the technique for hiding secret information in other data such as multimedia images, text, audio. ...
and Optimal Coefficients Adjustment Process (OCAP).The system combines an float wavelet transform and the variable rate of embedding and embeds secret data in a random order using a secret key only known ...
doi:10.5120/15181-3528
fatcat:tboogcbgf5egzh6cjmadrd5rw4
Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems
2016
Open Physics
Frequency domain transforms such as Bandelet Transform (BT) and Finite Ridgelet Transform (FRIT) are used in combination with GA and PSO to improve the efficiency of the image steganography system. ...
These transform coefficients may not be optimal in terms of the stego image quality and embedding capacity. ...
Conclusion In this paper, the frequency domain Steganography and optimization techniques are combined to design the efficiency improved steganography system. ...
doi:10.1515/phys-2016-0052
fatcat:u3wtv4vx2rcwjkpdhdnwdbaxwi
Nature Inspired Algorithm for Pixel Location Optimization in Video Steganography Using Deep RNN
2022
International journal on engineering, science and technology
The steganography is applied on text, image, video, and audio files. The steganography is useful for safe and secure data transmission. ...
The proposed method gives enhanced performance, which is seen with the parameters, Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and Correlation Coefficient (CC) which defines image quality ...
Patil Deemed to be University), where first author, Shamal Salunkhe is full time employee in the Department of Instrumentation Engineering and working part-time research scholar in Veermata Jijabai Technological ...
doi:10.46328/ijonest.67
fatcat:bim25n3p4veovln3xeuqlpwsya
LSB steganography strengthen footprint biometric template
2021
Eastern-European Journal of Enterprise Technologies
The system is constructed in a hybridization manner between image processing, steganography, and artificial intelligence techniques. ...
The Least Significant Bit method transforms the foot template to a stego image and is stored on a stego visual database for further use. ...
Additionally, big thanks to the volunteers who helped to collect the foot-tip images to construct the visual database. ...
doi:10.15587/1729-4061.2021.225371
fatcat:kqnj335ryrcebl3jc65jnn6api
A Hybrid Curvelet Transform and Genetic Algorithm for Image Steganography
2017
International Journal of Advanced Computer Science and Applications
In this paper, we present a new hybrid image steganography algorithm by combining two famous techniques which are curvelet transform and genetic algorithm GA. ...
The proposed algorithm is called Hybrid Curvelet Transform and Genetic Algorithm for image steganography (HCTGA). ...
Some filters are applied to the cover image as a preprocessing technique to remove the noise and enhance the quality of the images. ...
doi:10.14569/ijacsa.2017.080843
fatcat:4gfhczddkzdpnm64g3yyutxace
Enhanced Whale Optimization Algorithm and Wavelet Transform for Image Steganography
2019
Multimedia Research
A method called image steganography is used, which assures security to the concealed communication and protection of the information. ...
Hence, this paper presents an algorithm for image steganography by exploiting sparse representation, and a method called Enhanced Whale Optimization Algorithm (WOA) in order to effectual selection of the ...
In image steganography, there are two techniques, such as spatial techniques and frequency-domain techniques correspondingly. ...
doi:10.46253/j.mr.v2i3.a3
fatcat:dqjan6rp3bhlxdtx4pcd7zyutu
A Proposed Novel Architecture for Information Hiding in Image Steganography by Using Genetic Algorithm and Cryptography
2016
Procedia Computer Science
For appealing the defence of data thrashing and communication over network, the anticipated system uses cryptographic algorithm along with Steganography. ...
In the anticipated system, the file which we want to make protected is firstly compressed to shrink in size and then the compressed data is transformed into cipher text by using AES cryptographic algorithm ...
In this work we will spotlight to build up a system, which uses both cryptography and steganography for better privacy and security. ...
doi:10.1016/j.procs.2016.05.127
fatcat:7corzb75bbhktm6dtg7k6wlcka
HIDING DATA IN VIDEO FILES USING DISCRETE WAVELENGTH TRANSFORM AND FIBONACCI SERIES ALGORITHM
2020
International journal of engineering sciences & research technology
The proposed system is tested on various inputs and results evaluated are compared with the existing system. ...
The proposed system also uses Fibonacci series to evaluate the next pixel in which data is to be hidden. Data is hidden using DWT algorithm. ...
In this paper we have used a new image steganography technique using Fast Fourier Transform on the cover image Then the secret image is embedded into the two components of the cover image formed after ...
doi:10.29121/ijesrt.v9.i9.2020.2
fatcat:ybdwvuftfrb3dmpbvrt72w3t6u
Review on secured data capabilities of cryptography, steganography, and watermarking domain
2020
Indonesian Journal of Electrical Engineering and Computer Science
This paper concludes that cryptography techniques could be utilized with steganography and watermarking in secured data domain to enhance the security mechanisms.</span> ...
<span>Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. ...
ACKNOWLEDGEMENTS We would like to thank Dean, School of Computing, Universiti Utara Malaysia and director of Awang Had Saleh Graduation School (AHSGS) for their moral support to the achievement of this ...
doi:10.11591/ijeecs.v17.i2.pp1053-1058
fatcat:zug25t23hffk5f53wb2ev6rede
« Previous
Showing results 1 — 15 out of 1,387 results