Digital image steganography: survey and analysis of current methods

From MaRDI portal
Revision as of 00:01, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1046637

DOI10.1016/j.sigpro.2009.08.010zbMath1177.94138OpenAlexW2028197392WikidataQ118319905 ScholiaQ118319905MaRDI QIDQ1046637

Kevin Curran, Abbas Cheddad, Joan Condell, Paul Mc Kevitt

Publication date: 22 December 2009

Published in: Signal Processing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.sigpro.2009.08.010



Related Items

An image watermarking framework based on PSO and FrQWT, An encrypted coverless information hiding method based on generative models, Reversible and fragile watermarking for medical images, A hybrid algorithm for robust image steganography, An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications, A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme, A secure and improved self-embedding algorithm to combat digital document forgery, A skin tone detection algorithm for an adaptive approach to steganography, Current status and key issues in image steganography: a survey, A new double color image watermarking algorithm based on the SVD and Arnold scrambling, Secret sharing with multi-cover adaptive steganography, Exploiting Voronoi diagram properties in face segmentation and feature extraction, A further study of large payloads matrix embedding, Adaptive multilevel technique based on histogram shifting for reversible data hiding, An improved section-wise exploiting modification direction method, New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check, A new reversible date-hiding algorithm for encrypted images, An efficient steganographic technique for hiding data, Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding, Digital image steganography: survey and analysis of current methods, Deleting digits


Uses Software


Cites Work