steganography 2021




Universal adversarial perturbations through the lens of deep steganography : Towards a fourier perspective
free download

The booming interest in adversarial attacks stems from a misalignment between human vision and a deep neural network (DNN), ie a human imperceptible perturbation fools the DNN. Moreover, a single perturbation, often called universal adversarial perturbation (UAP)

Significant features for steganography techniques using deoxyribonucleic acid: A review
free download

Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruders ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for

Studies on Image Steganography
free download

Images play a big role in our digital environment and keeping them safe during the data transfer process can be a difficult task. While there are many methods to safely transfer images such as public-key cryptography, symmetric encryption, and watermarking;

DEVELOPMENT OF A HOME CARE SUPPORT SYSTEM FOR PERITONEAL DIALYSIS PATIENTS I-USING DIGITAL WATERMARKING AND STEGANOGRAPHY
free download

Abstract Background and Aims As it is necessary to refrain from going out due to the COVID- 19 pandemic, a system that allows dialysis patients to be treated at a remote location or at home, ie, a home care support system, is required. Information and communications

Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography
free download

With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security

IoT based on secure personal healthcare using RFID technology and steganography .
free download

Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the internal environment

Multi-Stage Protection using Pixel Selection Technique for Enhancing Steganography
free download

Steganography and data security are extremely important for all organizations. This research introduces a novel stenographic method called multi-stage protection using the pixel selection technique (MPPST). MPPST is developed based on the features of the pixel

Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm
free download

This paper presents a high capacity steganographic approach with secret message validation scheme at the receiver end. The proposed idea develops specifically for animated GIF, the cover media, to conceal secret text messages where Least Significant Digit (LSD)

STATISTICAL MODELS FOR IMAGE STEGANOGRAPHY EXPLAINING AND REPLACING HEURISTICS
free download

The steganographic field is nowadays dominated by heuristic approaches for data hiding. While there exist a few model-based steganographic algorithms designed to minimize statistical detectability of the underlying model, many more algorithms based on costs of Steganography is a current hot research topic in the area of information security and privacy protection. However, most previous steganography methods are not effective against steganalysis and attacks because they are usually carried out by modifying covers. In this

Improving Adaptive Steganography Performance with Intelligent Embedding Key Selection Using Optimization Algorithms
free download

Adaptive steganography methods use variable embedding capacity according to the uniformity or edges of image areas. ALSBMR is an adaptive method with two main stages: Selecting suitable pixels, and embedding them using the LSBMR method. This method

Review of the Literature on the Steganography Concept
free download

Information hiding is a subject of study from past to present. Information hiding processes, called steganography have been the focus of interest since the beginning of history because they are strategically interested in valuable information. In our study, the

Binary Image Steganography based on Permutation
free download

We propose a steganographic scheme based on permutations, which improves the capacity of embedding information in a series of p host binary images. Given a host binary image block of size mxn bits and any embedding technique T, where T can hide Q (m, n) bits of

Statistical Feature Based Steganalysis for Pixel-Value Differencing Steganography
free download

The security and embedding capacity of pixel-value differencing (PVD) steganography is superior to that of least significant bit replacement steganography . Several studies have proposed extended PVD steganography methods that use the original concept of PVDThe radical enhancements in the technology and internet has led information to be shared in just single click. As a result, it really became important to worry about the intellectual property protection on the internet. Steganography and cryptography could be very much

Medical JPEG image steganography method according to the distortion reduction criterion based on an imperialist competitive algorithm
free download

In most of the digital steganography methods provided for natural digital images, the embedding of the confidential message is based on the minimisation of the defined distortion functions. It is often done based on choosing the most optimal criterion of The fast improvement of the Web has expanded the simplicity of sharing data to individuals around the world. In any case, this headway additionally raises a trouble about information control when the data is transferred by the sender to the beneficiary. Along these lines, data

Comparative Analysis of Different Steganography Technique for Image Security
free download

In the age of information technology, the most vital part of information exchange and communication is the Internet. With the enhancement of information technology and internet, digital media has become one of the most popular data transfer tools. This digital data

Subject Review: Information Steganography Based on Different Methods
free download

Today, huge amounts of information are transmitted over the communication networks, especially via the Internet. Therefore, many individuals are concerned with data security. Various methods were appeared to maintain data security, and the most common of these

Securing Data in IOT using Cryptography Steganography Techniques
free download

Steganography is a technique of hiding every secret information like text, image, audio behind original cover file. Video Steganography is to hide the existence of the message from unauthorized party using Video as cover file and hiding information in video. Steganography

Image based steganography using cryptography
free download

In the world of increasing usage of the internet, data security plays an important role in achieving confidentiality, authentication, and integrity for secure communication. Cryptography and Steganography is the method to achieve data security through which

HYBRID TECHNIQUE FOR HIGH PAYLOAD CAPACITY USING ECC AND STEGANOGRAPHY .
free download

Information plays crucial role in any organization in this present generation usage of internet and generating lots of information is increased exponentially. To protect this information is a big challenge for every organization. For suppose while storing the data on cloud we must

Secure image hiding in speech signal by steganographymining and encryption
free download

Information hiding techniques are constantly evolving due to the increased need for security and confidentiality. This paper proposes a working mechanism in three phases. The first phase includes scrambling the values of the gray image depending on a series of keys that

Hybrid Speech Steganography System using SS-RDWT with IPDP-MLE approach
free download

In the last two decades, it has been observed that there have been remarkable advancements in digital media communication. It has lots of advantages and business potential as it needs no physical media or transport. However, digital media can also create

An Overview of Steganography through History
free download

Steganography is the science of hiding information. The information can take any form and type including images, audio files, and texts. The practice of hiding information is not new and has taken uncommon ways to hide secret messages. People used to convey secret

Evaluation of using Steganography Technique to Hide a Text in Grayscale Digital Images
free download

this paper presents a new approach to hide sensitive data inside grayscale digital image. It makes use of combining the RSA encryption algorithm with steganography technique. This approach based on searching for identical bits-two by two bits-between the sensitive data

SECURE QUANTUM STEGANOGRAPHY FOR CONVOLUTIONAL NEURAL NETWORK.
free download

The security of delicate data is an earnest need in the present correspondence, primarily in cloud and Internet of Things (IoT) conditions. In this manner, an all around planned security component ought to be painstakingly thought of. This structure for secure data in mist cloud This paper is to create a practical steganographic implementation for 4-bit images. The proposed technique converts 4 bit image into 4 shaded Gray Scale image. This image will be act as reference image to hide the text. Using this grey scale reference image any text

Enhancing the Security of Mobile Cloud Computing using Audio Steganography with Least Significant Bit Insertion
free download

Cloud Computing is an emerging and a popular technology that allows users to access and process Information from a remote location. These users use mobile applications to offload sensitive data over a network especially, the Internet to cloud. They are security and privacy

Forensics of Content Adaptive Steganography Techniques
free download

Digital images are versatile due to their universal acceptability. Sometimes image are used to send secret messages. Several steganographic techniques exist to hide the messages in unnoticeable way. Out of several categories content adaptive steganographic techniques

Meteor: Cryptographically Secure Steganography for Realistic Distributions
free download

Despite a long history of research and wide-spread applications to censorship resistant systems, practical steganographic systems capable of embedding messages into realistic communication distributions, like text, do not exist. We identify two primary impediments to

A Image Security with Image Steganography Using Dct Coefficient and Encryption
free download

Image data security is the essential portion in communication and multi media world. During storing and sharing, avoid third party access of data is the challenge one. Providing security of data is the clever work and art also. Many protection algorithms are used in recent years

Improved Cryptography by Applying Transposition on Modified Playfair Algorithm Followed by Steganography
free download

The current internet era is marked with the generation of billions and trillions of data. Most of it is concomitant with the financial sector, intelligence sector or be the personal data pertaining to individuals and to the nation. Hence, it is crucial to protect and secure it

ANT COLONY OPTIMIZATION BASED OPTIMAL STEGANOGRAPHY TECHNIQUE FOR SECRET IMAGE SHARING SCHEME
free download

Data hiding earlier to transmission remains as an essential process for reducing the security issues in the cloud based environment. Image encryption and steganography techniques verify the safety of secret data during the transmission over the Internet. This paper presents

A NOVEL GEOTAGGING METHOD USING IMAGE STEGANOGRAPHY AND GPS
free download

Geo tagging has become a new miracle that allows customers to portray and monitor photo collections in numerous new and interesting ways. Fortunately, manual geotagging of an enormous number of images on the globe remains a tedious and lasting task despite the

SECURE DATA TRANSMISSION THROUGH NETWORK USING TINY ENCRYPTION ALGORITHM FOLLOWED BY STEGANOGRAPHY
free download

Nowadays, any form of internet connection with other network applications must be protected due to their increasing use. In this work, many security algorithms have been used and are still in use. With this development, the attackers have also come up with new ideasSteganography is a means to hide information which is mainly confidential in order to avoid leakage of important data. In medical diagnosis it is necessary to hide the medical records of the patients on moral grounds. This research paper applies image steganography using

A Review of an Extensive Survey on Audio Steganography Based on LSB Method
free download

There is issues and challenges regarding the security of information in transit from senders to receivers. The major issue is the protection of digital data against any form of intrusion, penetration, and theft. The major challenge is developing a solution to protect information

An Enhancement of Kerberos Using Biometric Template and Steganography
free download

Kerberos, a renowned token based authentication protocol, which is famous since mid-80s for its cryptographic process, assurance of privacy, and data security for identifying appropriate users. Due to its versatile characteristics, users of the system often need to Steganography is an art and a science that includes communicating the secret message in an appropriate multimedia carrier, eg, image, audio and video files. In the last decade, image steganography has received a lot of attention due to the lowering of the cost of