Articles with "image steganography" as a keyword



Photo by usgs from unsplash

Multiplexing Optical Images for Steganography by Single Metasurfaces.

Sign Up to like & get
recommendations!
Published in 2023 at "Small"

DOI: 10.1002/smll.202206319

Abstract: Image steganography based on intelligent devices is one of the effective routes for safely and quickly transferring secret information. However, optical image steganography has attracted far less attention than digital one due to the state-of-the-art… read more here.

Keywords: multiplexing optical; image steganography; images steganography; steganography single ... See more keywords
Photo from wikipedia

A Novel Quantum Image Steganography Scheme Based on LSB

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-018-3710-x

Abstract: Based on the NEQR representation of quantum images and least significant bit (LSB) scheme, a novel quantum image steganography scheme is proposed. The sizes of the cover image and the original information image are assumed… read more here.

Keywords: image; quantum image; scheme; steganography scheme ... See more keywords
Photo from wikipedia

Image steganography for authenticity of visual contents in social networks

Sign Up to like & get
recommendations!
Published in 2017 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-017-4420-8

Abstract: Social networks are major sources of image sharing and secret messaging among the people. To date, such networks are not strictly bounded by copyright laws due to which image sharing, secret messaging, and its authentication… read more here.

Keywords: image; social networks; visual contents; authenticity visual ... See more keywords
Photo by disfruta_cafe from unsplash

Edge based image steganography with variable threshold

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6975-4

Abstract: With the rapid escalation of the usage of sensitive data exchange through internet, information security has become a vulnerable realm of concern. Numerous security policies are incorporated, steganography being one of them. In this paper,… read more here.

Keywords: threshold; edge based; image steganography; image ... See more keywords
Photo from wikipedia

Enhanced payload and trade-off for image steganography via a novel pixel digits alteration

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08283-9

Abstract: Many high capacity image steganography algorithms have been proposed but at the cost of lower imperceptibility. To fill the gap, this paper proposes a novel RGB image steganography technique that not only enhances the hiding… read more here.

Keywords: image; capacity; trade; image steganography ... See more keywords
Photo by usgs from unsplash

Image steganography using contourlet transform and matrix decomposition techniques

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7512-9

Abstract: This paper presents the transform domain image steganography schemes using three popular matrix factorization techniques and contourlet transform. It is known that security of image steganography is mainly evaluated using undetectability of stego image when… read more here.

Keywords: decomposition techniques; image steganography; image; matrix ... See more keywords
Photo from wikipedia

FFT-ETM based distortion less and high payload image steganography

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7664-7

Abstract: This paper is presenting a novel high capacity based imperceptible and robust image steganography technique for obscured communication. A considerable literature studied on this domain reveals distortion that drastically affects image quality. These techniques obscure… read more here.

Keywords: host image; image steganography; image; covert image ... See more keywords
Photo from wikipedia

Secure binary image steganography based on LTP distortion minimization

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7731-0

Abstract: This paper proposes a secure binary image steganography by minimizing the flipping distortion on the statistics of local texture pattern (LTP) and constructing flexible carriers of syndrome-trellis code (STC). Firstly, the change of LTP’s statistic… read more here.

Keywords: secure binary; distortion; binary image; image steganography ... See more keywords
Photo by usgs from unsplash

Blind image steganography algorithm development which resistant against JPEG compression attack

Sign Up to like & get
recommendations!
Published in 2022 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-021-11351-8

Abstract: Digital image steganography is now one of the effective methods for exchanging confidential information over the public network. One of the major challenges is to protect secret data embedded in to image against JPEG compression.… read more here.

Keywords: image; image steganography; jpeg compression;
Photo by drew_hays from unsplash

Effective payload and improved security using HMT Contourlet transform in medical image steganography

Sign Up to like & get
recommendations!
Published in 2019 at "Health and Technology"

DOI: 10.1007/s12553-018-00285-1

Abstract: This paper implements a novel approach for image steganography based on Hidden Markov Tree (HMT) Contourlet transform. In this paper, the biomedical image considers as a cover image and it is mapped to a specific… read more here.

Keywords: medical image; image steganography; hmt contourlet; image ... See more keywords
Photo from wikipedia

Image steganography based on a new hybrid chaos map and discrete transforms

Sign Up to like & get
recommendations!
Published in 2021 at "Optik"

DOI: 10.1016/j.ijleo.2020.165492

Abstract: Abstract With the development of Internet networks, the importance of information security is becoming more and more significant. Therefore, it is considered necessary to study the existing methods in order to develop them for creating… read more here.

Keywords: image; based new; new hybrid; steganography based ... See more keywords