Year : 2023
Latest Trends in Deep Learning Techniques for Image Steganography
Cite this Research Publication : V Kumar, S Sharma, C Kumar, A K Sahu, "Latest Trends in Deep Learning Techniques for Image Steganography," International Journal of Digital Crime and Forensics (IJDCF), IGI, 15 (1), 1-14, DOI: 10.4018/IJDCF.318666, 2023.
Year : 2023
A Study on Content Tampering in Multimedia Watermarking
Cite this Research Publication : Aditya Kumar Sahu, Krishnan Umachandran, Vaishali D. Biradar, Olebara Comfort, V. Sri Vigna Hema, Frank Odimegwu & Saifullah M. A., "A Study on Content Tampering in Multimedia Watermarking," SN Computer Science, Springer, 4(3), 2023, 1-11.
Publisher : Springer
Year : 2023
Secure reversible data hiding using block-wise histogram shifting
Cite this Research Publication : S. Kamil, M. Sahu, Raghunadan K , A K Sahu, "Secure reversible data hiding using block-wise histogram shifting", Electronics, 12(5), 1222, 2023,. (Indexed in SCIE (IF: 2.6), Q2). DOI: https://doi.org/10.3390/electronics12051222
Year : 2023
Local-Ternary-Pattern-Based Associated Histogram Equalization Technique for Cervical Cancer Detection
Cite this Research Publication : S. Srinivasan, A. Karuppanan, S. Mathivanan, P. Jayagopal, JC. Babu, A. K. Sahu, "Local-Ternary-Pattern-Based Associated Histogram Equalization Technique for Cervical Cancer Detection," Diagnostics. 13 (3). 548-555, 2023, DOI: 10.3390/diagnostics13030548
Year : 2023
Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing
Cite this Research Publication : K. R Raghunandan, R. Dodmane, K. Bhavya, K. Rao, A. K. Sahu, "Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing", IEEE Access, Volume: 11, 3545 - 3554, DOI: 10.1109/ACCESS.2022.3232461, 2023
Publisher : IEEE Access
Year : 2023
Dual image-based reversible fragile watermarking scheme for tamper detection and localization
Cite this Research Publication : Sahu, A.K., Sahu, M., Pramoda Patro, Gupteswar Sahu & Soumya Ranjan Nayak, "Dual image-based reversible fragile watermarking scheme for tamper detection and localization," Pattern Analysis and Application, 26, pages 571–590 (2023). DOI: https://doi.org/10.1007/s10044-022-01104-0
Year : 2022
Data Hiding using PVD and improving security using RSA
Cite this Research Publication : J. Hemalatha, K. Kamatchi, A. K. Sahu, "Data Hiding using PVD and improving security using RSA", Journal of Applied Security Research, Tayler & Francis (T&F), Volume 17, Issue 3, 2022. DOI: https://doi.org/10.1080/19361610.2021.1900692
Publisher : Tayler & Francis (T&F)
Year : 2022
False-Positive-Free SVD Based Audio Watermarking with Integer Wavelet Transform
Cite this Research Publication : N. V. Lalitha, G. Suresh, D. P. Gangwar; A K Sahu, "False-Positive-Free SVD based audio watermarking with integer wavelet transform", Circuits, Systems & Signal Processing, Springer, 41, 5108–5133, 2022.
Year : 2022
Local binary pattern based reversible data hiding
Cite this Research Publication : M. Sahu, N. M. Padhy, S.S. Gantayat, A. K. Sahu, "Local binary pattern based reversible data hiding," CAAI Transactions on Intelligence Technology, John Wiley & Sons Inc., Volume 7, Issue 4, Pages 695-709 2022. DOI: https://doi.org/10.1049/cit2.12130
Publisher : John Wiley & Sons Inc
Year : 2022
High Fidelity based Reversible Data Hiding using Modified LSB Matching and Pixel Difference
Cite this Research Publication : A. K. Sahu, G. Swain, "High Fidelity based Reversible Data Hiding using Modified LSB Matching and Pixel Difference", Journal of King Saud University-Computer and Information Sciences, Elsevier, Volume 34, Issue 4, April 2022, Pages 1395-1409, https://doi.org/10.1016/j.jksuci.2019.07.004.
Year : 2022
A logistic map based blind and fragile watermarking for tamper detection and localization in images
Cite this Research Publication : A. K. Sahu, "A logistic map based blind and fragile watermarking for tamper detection and localization in images", Journal of Ambient Intelligence and Humanized Computing, Springer, 13, 869–3881, 2021.
Year : 2022
Improving grayscale steganography to protect personal information disclosure within hotel services
Cite this Research Publication : A. K. Sahu, A. Gutub, "Improving grayscale steganography to protect personal information disclosure within hotel services", Multimedia Tools and Applications, 81, 30663 - 30683, 2022.
Publisher : Springer
Year : 2022
Logistic-map based fragile image watermarking scheme for tamper detection and localization
Cite this Research Publication : A K Sahu, M. Hassaballah, S Routhu, G Suresh, "Logistic-map based fragile image watermarking schema for tamper detection and localization", Multimedia Tools and Applications, 2022. https://doi.org/10.1007/s11042-022-13630-4
Year : 2021
Shadow Image Based Reversible Data Hiding Using Addition and Subtraction Logic on the LSB Planes
Cite this Research Publication : M. Sahu, N. Padhy, S. S. Gantayat, A. K. Sahu, "Shadow Image Based Reversible Data Hiding Using Addition and Subtraction Logic on the LSB Planes," Sensing and Imaging, Springer, 22:7, 2021.
Year : 2021
Multi-directional Block based PVD and Modulus Function Image Steganography to avoid FOBP and IEP
Cite this Research Publication : A. K. Sahu, G. Swain, Monalisa Sahu, J Hemalatha, "Multi-directional Block based PVD and Modulus Function Image Steganography to avoid FOBP and IEP", Journal of Information Security and Applications, Elsevier, 58, 102808, 2021. DOI: https://doi.org/10.1016/j.jisa.2021.102808
Publisher : Elsevier
Year : 2020
Reversible Image Steganography using dual-layer LSB matching
Cite this Research Publication : A. K. Sahu, G. Swain, "Reversible Image Steganography using dual-layer LSB matching", Sensing and Imaging, 21: 1. Springer, 2020.
Year : 2020
Digital Image Steganography and Steganalysis: A Journey of the Past Three Decades
Cite this Research Publication : A. K. Sahu and M. Sahu, "Digital Image Steganography and Steganalysis: A Journey of the Past Three Decades," September, Open Computer Science, Degruyter, 10, 1-47, DOI: https://doi.org/10.1515/comp-2020-0136, 2020
Year : 2019
Dual Stego-imaging based Reversible Data Hiding using Improved LSB Matching
Cite this Research Publication : A. K. Sahu, G. Swain, "Dual Stego-imaging based Reversible Data Hiding using Improved LSB Matching", International Journal of Intelligent Engineering and Systems, 12(5), 63-73, 2019. DOI: 10.22266/ijies2019.1031.0
Year : 2019
Digital Image Steganography using PVD and Modulo Operation
Cite this Research Publication : A. K. Sahu, G. Swain, "Digital Image Steganography using PVD and Modulo Operation", Internetworking Indonesian Journal. 10(2), 3-13, 2019
Year : 2019
Data hiding using adaptive LSB and PVD technique resisting PDH and RS-analysis
Cite this Research Publication : A. K. Sahu, G. Swain, "Data hiding using adaptive LSB and PVD technique resisting PDH and RS-analysis," International Journal of Electronic Security and Digital Forensics, Inderscience, 11(4), 458-476, 2019.
Year : 2019
A Novel Multi Stego-Image based Data Hiding Method for Gray Scale Image
Cite this Research Publication : A. K. Sahu, G. Swain, "A Novel Multi Stego-Image based Data Hiding Method for Gray Scale Image," Pertanika Journal of Science & Technology, 27(2), 753-768, 2019
Year : 2019
A Novel n-Rightmost Bit Replacement Image Steganography Technique
Cite this Research Publication : A. K. Sahu, G. Swain, "A novel n-rightmost bit replacement image steganography technique," 3D Research, Springer, 10(1), 1-18, 2019.
Year : 2019
An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function
Cite this Research Publication : A. K. Sahu, G. Swain, "An optimal information hiding approach based on pixel value differencing and modulus function", Wireless Personal Communications, Springer, 108(1), 159-174, 2019.
Year : 2018
Digital Image Steganography Using Bit Flipping
Cite this Research Publication : A. K. Sahu, G. Swain, E. S. Babu, "Digital Image Steganography Using Bit Flipping", Cybernetics and Information Technologies, Degruyter. 18(1), 69-80, 2018.
Year : 2018
An Improved Data Hiding Technique Using Bit Differencing and LSB Matching
Cite this Research Publication : A. K. Sahu, G. Swain, "An Improved Data Hiding Technique Using Bit Differencing and LSB Matching," Internetworking Indonesian Journal, 10(1), 17-21, 2018.
Year : 2018
Pixel Overlapping Image Steganography using PVD and Modulus Function
Cite this Research Publication : A. K. Sahu, G. Swain, "Pixel Overlapping Image Steganography using PVD and Modulus Function," 3D Research, Springer, 9(3), 1-14, 2018.
Publisher : Springer
Year : 2017
Digital Image Steganography Techniques in Spatial Domain: A Study
Cite this Research Publication : A. K. Sahu and M. Sahu, "Digital Image Steganography Techniques in Spatial Domain: A Study", International Journal of Pharmacy and Technology (IJPT), 8(4), 5205-5217, 2016.
Year : 2017
An Improved Information Hiding Method Using Group of Bits Substitution
Cite this Research Publication : A. K. Sahu, G. Swain, "An Improved Information Hiding Method Using Group of Bits Substitution," International Journal on Communications Antenna and Propagation (IRECAP), 7(2). 162-167, 2017.
Year : 2016
Performance Evaluation of Energy Efficient Power Models for Digital Cloud
Cite this Research Publication : S. R. Jena, V. V. Raja and A K Sahu, "Performance Evaluation of Energy Efficient Power Models for Digital Cloud", Indian Journal of Science and Technology (IJST), 9(48), Pg 1-7, DOI: 10.17485/ijst/2016/v9i48/105639, 2016.
Year : 2016
A review on LSB substitution and PVD based image steganography techniques
Cite this Research Publication : A. K. Sahu, G. Swain, "A review on LSB substitution and PVD based image steganography techniques," Indonesian Journal of Electrical Engineering and Computer Science, 2(3), 712-719, 2016.