Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    Enhanced Capacity Reversible Data Hiding Based on Pixel Value Ordering in Triple Stego Images

    Kim Sao Nguyen, Ngoc Dung Bui*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069355 - 10 November 2025

    Abstract Reversible data hiding (RDH) enables secret data embedding while preserving complete cover image recovery, making it crucial for applications requiring image integrity. The pixel value ordering (PVO) technique used in multi-stego images provides good image quality but often results in low embedding capability. To address these challenges, this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image. The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order. Four secret bits are embedded into each block’s maximum pixel value, while three additional More >

  • Open Access

    ARTICLE

    Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames

    Sara H. Elsayed1, Rodaina Abdelsalam1, Mahmoud A. Ismail Shoman2, Raed Alotaibi3,*, Omar Reyad4,5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4995-5013, 2025, DOI:10.32604/cmc.2025.068429 - 23 October 2025

    Abstract Ensuring the secure transmission of secret messages, particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security. Relying on a single-layered security approach is often insufficient for safeguarding sensitive data. This study proposes a triple-lightweight cryptographic and steganographic model that integrates the Hill Cipher Technique (HCT), Rotation Left Digits (RLD), and Discrete Wavelet Transform (DWT) to embed secret messages within video frames securely. The approach begins with encrypting the secret text using a private key matrix (PK1) of size 2 × 2 up to 6 × 6… More >

  • Open Access

    ARTICLE

    Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security

    Hanan Hardan1,*, Osama A. Khashan2,*, Mohammad Alshinwan1

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1681-1710, 2025, DOI:10.32604/cmc.2025.061659 - 09 June 2025

    Abstract This study introduces an Edge-Based Data Hiding and Extraction Algorithm (EBDHEA) to address the problem of data embedding in images while preserving robust security and high image quality. The algorithm produces three classes of pixels from the pixels in the cover image: edges found by the Canny edge detection method, pixels arising from the expansion of neighboring edge pixels, and pixels that are neither edges nor components of the neighboring edge pixels. The number of Least Significant Bits (LSBs) that are used to hide data depends on these classifications. Furthermore, the lossless compression method, Huffman… More >

  • Open Access

    ARTICLE

    FuzzyStego: An Adaptive Steganographic Scheme Using Fuzzy Logic for Optimizing Embeddable Areas in Spatial Domain Images

    Mardhatillah Shevy Ananti1, Adifa Widyadhani Chanda D’Layla1, Ntivuguruzwa Jean De La Croix1,2, Tohari Ahmad1,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1031-1054, 2025, DOI:10.32604/cmc.2025.061246 - 09 June 2025

    Abstract In the evolving landscape of secure communication, steganography has become increasingly vital to secure the transmission of secret data through an insecure public network. Several steganographic algorithms have been proposed using digital images with a common objective of balancing a trade-off between the payload size and the quality of the stego image. In the existing steganographic works, a remarkable distortion of the stego image persists when the payload size is increased, making several existing works impractical to the current world of vast data. This paper introduces FuzzyStego, a novel approach designed to enhance the stego… More >

  • Open Access

    ARTICLE

    An Efficient EMD-Based Reversible Data Hiding Technique Using Dual Stego Images

    Ahmad A. Mohammad*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1139-1156, 2023, DOI:10.32604/cmc.2023.035964 - 06 February 2023

    Abstract Exploiting modification direction (EMD) based data hiding techniques (DHTs) provide moderate data hiding capacity and high-quality stego images. The overflow problem and the cyclic nature of the extraction function essentially hinder their application in several fields in which reversibility is necessary. Thus far, the few EMD reversible DHTs are complex and numerically demanding. This paper presents a novel EMD-based reversible DHT using dual-image. Two novel 2 × 4 modification lookup tables are introduced, replacing the reference matrix used in similar techniques and eliminating the numerically demanding search step in similar techniques. In the embedding step, one of… More >

  • Open Access

    ARTICLE

    Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data

    R. Bala Krishnan1, M. M. Anishin Raj2, N. Rajesh Kumar1, B. Karthikeyan3, G. Manikandan3,*, N. R. Raajan4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 221-235, 2022, DOI:10.32604/iasc.2022.021775 - 26 October 2021

    Abstract In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the… More >

  • Open Access

    ARTICLE

    Novel Ransomware Hiding Model Using HEVC Steganography Approach

    Iman Almomani1,2,*, Aala AlKhayer1, Walid El-Shafai1,3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1209-1228, 2022, DOI:10.32604/cmc.2022.018631 - 07 September 2021

    Abstract Ransomware is considered one of the most threatening cyberattacks. Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves, but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed. Therefore, this paper proposes a novel ransomware hiding model by utilizing a block-based High-Efficiency Video Coding (HEVC) steganography approach. The main idea of the proposed steganography approach is the division of the secret ransomware data and cover HEVC frames into different blocks. After that, the Least Significant Bit (LSB) based Hamming Distance (HD)… More >

  • Open Access

    ARTICLE

    Image Steganography in Spatial Domain: Current Status, Techniques, and Trends

    Adeeb M. Alhomoud*

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 69-88, 2021, DOI:10.32604/iasc.2021.014773 - 07 January 2021

    Abstract This research article provides an up-to-date review of spatial-domain steganography. Maintaining the communication as secure as possible when transmitting secret data through any available communication channels is the target of steganography. Currently, image steganography is the most developed field, with several techniques are provided for different image formats. Therefore, the general image steganography including the fundamental concepts, the terminology, and the applications are highlighted in this paper. Further, the paper depicts the essential characteristics between information hiding and cryptography systems. In addition, recent well-known techniques in the spatial-domain steganography, such as LSB and pixel value More >

  • Open Access

    ARTICLE

    A Novel Quantum Stegonagraphy Based on Brown States

    Zhiguo Qu1,*, Tiancheng Zhu2, Jinwei Wang1, Xiaojun Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 47-59, 2018, DOI:10.3970/cmc.2018.02215

    Abstract In this paper, a novel quantum steganography protocol based on Brown entangled states is proposed. The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states. Comparing with the previous quantum steganography algorithms, the new protocol focuses on its anti-noise capability for the phase-flip noise, which proved its good security resisting on quantum noise. Furthermore, the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good… More >

Displaying 1-10 on page 1 of 9. Per Page