A new approach for LSB based image steganography using secret key
SMM Karim, MS Rahman… - … conference on computer …, 2011 - ieeexplore.ieee.org
… So by using a secret key, we can increase the security level of the hidden information in LSB
based image steganography. … available describing features of image steganography. Many …
based image steganography. … available describing features of image steganography. Many …
Highly randomized image steganography using secret keys
S Dagar - … Conference on Recent Advances and Innovations in …, 2014 - ieeexplore.ieee.org
… of steganography which uses image as a carrier and secret file as a … Image generated as
an outcome of steganography process which contains secret information is called stego image. …
an outcome of steganography process which contains secret information is called stego image. …
A novel secure model: Image steganography with logistic map and secret key
… use of steganography in secure communication. The aim of this paper is to provide secure
communication via a new image steganography using LSB method with secret key … of image …
communication via a new image steganography using LSB method with secret key … of image …
[PDF][PDF] A novel approach for image steganography using dynamic substitution and secret key
… in an application cover carrier like image, text, audio, and … substitution based Image
Steganography (IS) with a secret key. Our … of the host image and a secret key resulting increased …
Steganography (IS) with a secret key. Our … of the host image and a secret key resulting increased …
Secret image sharing with steganography and authentication
CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
… Use the secret key K as a seed for a pre-selected binary random number generating function
f to generate a sequence of m 2 binary numbers P 1 ,P 2 ,…,P m 2 . Regard each binary …
f to generate a sequence of m 2 binary numbers P 1 ,P 2 ,…,P m 2 . Regard each binary …
[PDF][PDF] A new method in image steganography with improved image quality
AM Al-Shatnawi - Applied Mathematical Sciences, 2012 - kresttechnology.com
… The secret key is usually used to embed the … image quality and make the message more
secure. In this research paper the RGB images are used as a carrier message to hide the secret …
secure. In this research paper the RGB images are used as a carrier message to hide the secret …
[PDF][PDF] A secret-key image steganography technique using random chain codes
MAF Al-Husainy, DM Uliyan - International Journal of Technology, 2019 - researchgate.net
… But, these techniques failed to use the full capacity of the carrier image. In this paper, a
secret key image steganography technique has been implemented using chains of a random …
secret key image steganography technique has been implemented using chains of a random …
Steganography algorithm to hide secret message inside an image
R Ibrahim, TS Kuan - arXiv preprint arXiv:1112.2809, 2011 - arxiv.org
… images using steganography technique. An algorithm is designed to hide all the data inputted
within the image … storing the secret key inside the image, only 6 characters are used for the …
within the image … storing the secret key inside the image, only 6 characters are used for the …
Visual cryptographic steganography in images
P Marwaha, P Marwaha - 2010 Second international …, 2010 - ieeexplore.ieee.org
… key systems require each user to have two keys – a public key and a private key (secret
key)… The sender of the data encrypts the message using the receiver’s public key. The receiver …
key)… The sender of the data encrypts the message using the receiver’s public key. The receiver …
[PDF][PDF] Image steganography using least significant bit and secret map techniques.
A ALabaichi, MAAK Al-Dabbas… - International journal of …, 2020 - researchgate.net
… for image steganography. The current study mainly focuses on made image steganography
using LSB techniques is complex and the hidden information is controlled by the secret keys …
using LSB techniques is complex and the hidden information is controlled by the secret keys …
相关搜索
- image steganography techniques
- lsb based image steganography
- image steganography method
- image steganography algorithm
- secure image steganography
- secret image steganography and authentication
- lsb substitution method image steganography
- logistic map secret key
- color image steganography
- modified rsa algorithm image steganography
- colour cycle algorithm image steganography
- random function image steganography
- data mapping image steganography
- enhanced mechanism image steganography
- image steganography using cryptography
- image steganography using encryption