A new approach for LSB based image steganography using secret key

SMM Karim, MS Rahman… - … conference on computer …, 2011 - ieeexplore.ieee.org
… So by using a secret key, we can increase the security level of the hidden information in LSB
based image steganography. … available describing features of image steganography. Many …

Highly randomized image steganography using secret keys

S Dagar - … Conference on Recent Advances and Innovations in …, 2014 - ieeexplore.ieee.org
… of steganography which uses image as a carrier and secret file as a … Image generated as
an outcome of steganography process which contains secret information is called stego image. …

A novel secure model: Image steganography with logistic map and secret key

M Ulker, B Arslan - … Symposium on Digital Forensic and Security …, 2018 - ieeexplore.ieee.org
use of steganography in secure communication. The aim of this paper is to provide secure
communication via a new image steganography using LSB method with secret key … of image

[PDF][PDF] A novel approach for image steganography using dynamic substitution and secret key

SA Sohag, MK Islam, MB Islam - American Journal of Engineering …, 2013 - researchgate.net
… in an application cover carrier like image, text, audio, and … substitution based Image
Steganography (IS) with a secret key. Our … of the host image and a secret key resulting increased …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
Use the secret key K as a seed for a pre-selected binary random number generating function
f to generate a sequence of m 2 binary numbers P 1 ,P 2 ,…,P m 2 . Regard each binary …

[PDF][PDF] A new method in image steganography with improved image quality

AM Al-Shatnawi - Applied Mathematical Sciences, 2012 - kresttechnology.com
… The secret key is usually used to embed the … image quality and make the message more
secure. In this research paper the RGB images are used as a carrier message to hide the secret

[PDF][PDF] A secret-key image steganography technique using random chain codes

MAF Al-Husainy, DM Uliyan - International Journal of Technology, 2019 - researchgate.net
… But, these techniques failed to use the full capacity of the carrier image. In this paper, a
secret key image steganography technique has been implemented using chains of a random …

Steganography algorithm to hide secret message inside an image

R Ibrahim, TS Kuan - arXiv preprint arXiv:1112.2809, 2011 - arxiv.org
images using steganography technique. An algorithm is designed to hide all the data inputted
within the image … storing the secret key inside the image, only 6 characters are used for the …

Visual cryptographic steganography in images

P Marwaha, P Marwaha - 2010 Second international …, 2010 - ieeexplore.ieee.org
key systems require each user to have two keys – a public key and a private key (secret
key)… The sender of the data encrypts the message using the receiver’s public key. The receiver …

[PDF][PDF] Image steganography using least significant bit and secret map techniques.

A ALabaichi, MAAK Al-Dabbas… - International journal of …, 2020 - researchgate.net
… for image steganography. The current study mainly focuses on made image steganography
using LSB techniques is complex and the hidden information is controlled by the secret keys