Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access


    Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data

    R. Bala Krishnan1, M. M. Anishin Raj2, N. Rajesh Kumar1, B. Karthikeyan3, G. Manikandan3,*, N. R. Raajan4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 221-235, 2022, DOI:10.32604/iasc.2022.021775

    Abstract In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the stego-image that supports the safe… More >

  • Open Access


    Image Steganography in Spatial Domain: Current Status, Techniques, and Trends

    Adeeb M. Alhomoud*

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 69-88, 2021, DOI:10.32604/iasc.2021.014773

    Abstract This research article provides an up-to-date review of spatial-domain steganography. Maintaining the communication as secure as possible when transmitting secret data through any available communication channels is the target of steganography. Currently, image steganography is the most developed field, with several techniques are provided for different image formats. Therefore, the general image steganography including the fundamental concepts, the terminology, and the applications are highlighted in this paper. Further, the paper depicts the essential characteristics between information hiding and cryptography systems. In addition, recent well-known techniques in the spatial-domain steganography, such as LSB and pixel value differencing, are discussed in detail… More >

Displaying 1-10 on page 1 of 2. Per Page  

Share Link