MbrlCatalogueTitleDetail

Do you wish to reserve the book?
A Novel Steganography Approach for Securing Confidential Personal Data
A Novel Steganography Approach for Securing Confidential Personal Data
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A Novel Steganography Approach for Securing Confidential Personal Data
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A Novel Steganography Approach for Securing Confidential Personal Data
A Novel Steganography Approach for Securing Confidential Personal Data

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A Novel Steganography Approach for Securing Confidential Personal Data
A Novel Steganography Approach for Securing Confidential Personal Data
Journal Article

A Novel Steganography Approach for Securing Confidential Personal Data

2025
Request Book From Autostore and Choose the Collection Method
Overview
In light of significant advancements in information technology and the increasing sophistication of methods used to access confidential information, particularly in critical sectors such as healthcare, intelligence, ATM cards, mobile applications, and the military, the use of steganography has become paramount. Steganography enables the concealment of sensitive data within various forms of multimedia, including videos, images, and sound. This not only secures the information to maintain confidentiality by preventing disclosure the sensitive data by unauthorized, but also conceals the very existence of communication between two entities. Our proposed approach introduces an innovative, lightweight technique that uses the Discrete Cosine Transformation (DCT) coefficients for data hiding according to specific thresholds and the distance between coefficients. Unlike traditional Least Significant Bit (LSB) steganography that operates in the spatial domain, our approach utilizes the frequency domain to enhance the concealment and security of the data. The effectiveness of our method was validated through standard metrics such as CC, MSE, PSNR, SSIM, and Histogram analysis. Three benchmark images (Lena, Baboon, Pepper) with 512x512 dimensions were used in the evaluation. demonstrating promising results. Furthermore, it exhibited robustness against compression by utilizing DCT coefficients from the medium frequency (MF) range. Payload enhancement was achieved by embedding the secret data into an RGB image (49,152 bits) which can be increased if we used a larger size of 512x512 image dimension. Using a 4x4 block size instead of 8x8 is suitable for IoT environments or mobile devices with limited resources while preserving the imperceptibility of modifications needed for each block. We tuned important hyperparameters, including the selection of DCT coefficients and threshold values.by utilizing two pairs of DCT coefficients instead of just one enhancing the security.