2022
DOI: 10.1007/s11045-021-00793-w
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…On the one hand, it communicates with the terminal of the perception control layer through ZigBee or other interfaces and forwards the data sent by the terminal to the server or forwards the remote control command of the server to the terminal, and on the other hand, it has Ethernet, Wi-Fi, or GPRS, etc. This communication interface can access the local area network of the cell to communicate with the remote server [ 11 ].…”
Section: Methodsmentioning
confidence: 99%
“…On the one hand, it communicates with the terminal of the perception control layer through ZigBee or other interfaces and forwards the data sent by the terminal to the server or forwards the remote control command of the server to the terminal, and on the other hand, it has Ethernet, Wi-Fi, or GPRS, etc. This communication interface can access the local area network of the cell to communicate with the remote server [ 11 ].…”
Section: Methodsmentioning
confidence: 99%
“…The ciphertext is injected using a 3, 3, 2 LSB replacement approach after encryption. In Almawgani et al (2022) , a hybrid steganography approach is developed that uses the Haar Discrete Wavelet Transform (HDWT), the Lempel Ziv Welch (LZW) algorithm, the Genetic Algorithm (GA), and the Optimal Pixel Adjustment Process (OPAP). The proposed article separates the cover picture into (n x n) pixels in non-overlapping chunks.…”
Section: Related Workmentioning
confidence: 99%
“…I NFORMATION hiding, also known as steganography, is a technology that utilizes the sensory redundancy of human sense organ to embed secret information into the carrier in an undetected way. The choice of carriers is diverse, such as videos [1], [2], images [3], [4], audios [5], [6], speeches [7], [8], texts [9], [10], and so so. In recent years, with the rapid development of network information technology, voice over IP (VoIP) gradually plays an important role in daily communication of human beings.…”
Section: Introductionmentioning
confidence: 99%