[PDF][PDF] Bit inverting map method for improved steganography scheme
AM Fadhil - Diss. Universiti Teknologi Malaysia, 2016 - core.ac.uk
Achieving an efficient and accurate steganography scheme for hiding information is the
foremost priority in the information and communication technology era. The developed …
foremost priority in the information and communication technology era. The developed …
A new secret image sharing with arithmetic coding
In this paper, we have proposed a new (t, n) secret image sharing scheme. In the proposed
method the secret image is pre-processed block wise so that image becomes more suitable …
method the secret image is pre-processed block wise so that image becomes more suitable …
Hiding Images in the Spatial Domain
SAS Almola - Informatica, 2023 - informatica.si
Nowadays, steganography has become a useful technology and the interest in it has
increased due to the rapid growth in the use of the internet, and it is applied to transmit …
increased due to the rapid growth in the use of the internet, and it is applied to transmit …
Arithmetic coding based secret image sharing with inverted pattern lsb substitution for share hiding to achieve better quality stego images
In this paper we have proposed a secret image sharing method using arithmetic coding. The
proposed method is inspired from the work presented in [25]. Objectives of the proposed …
proposed method is inspired from the work presented in [25]. Objectives of the proposed …
[PDF][PDF] 非等量备份和双认证自修复有限域图像分存
欧阳显斌, 邵利平, 乐志芳 - 软件学报, 2017 - jos.org.cn
传统有意义图像分存方案存在认证能力偏低, 攻击后不具备修复能力或修复能力整体较弱以及
嵌入掩体视觉质量不高等问题. 针对以上问题, 提出一种结合非等量备份和双认证自修复有限域 …
嵌入掩体视觉质量不高等问题. 针对以上问题, 提出一种结合非等量备份和双认证自修复有限域 …
Extended LBP Based Secret Image Sharing with Steganography
S Kumar Das, B Chandra Dhara - … : Proceedings of ICTIS 2020, Volume 1, 2021 - Springer
We have presented a new (k, n) threshold secret image sharing technique in this paper. The
secret image is first encoded under the proposed structure that uses the extended LBP …
secret image is first encoded under the proposed structure that uses the extended LBP …
Extended LBP Based Secret Image Sharing with Steganography
We have presented a new (k, n) threshold secret image sharing technique in this paper. The
secret image is first encoded under the proposed structure that uses the extended LBP …
secret image is first encoded under the proposed structure that uses the extended LBP …
[PDF][PDF] A Systematic Analysis of Advanced E-Banking Transactions Using Visual Cryptography Techniques
S Singh, AK Dwivedi - journal-dogorangsang.in
Image cryptography is another subject of study that is acquiring fame. For cryptography,
various procedures have been created after some time. Various encryption calculations …
various procedures have been created after some time. Various encryption calculations …
[PDF][PDF] Advanced E-Banking Transactions Using Visual Cryptography Techniques
S Singh, AK Dwivedi - journal-dogorangsang.in
Specialists have concocted a wide range of safety techniques to defend computerized data.
By putting away touchy data in a way that is dispersed over numerous areas, safety efforts …
By putting away touchy data in a way that is dispersed over numerous areas, safety efforts …
A (t, n) Multi-secret Sharing Scheme with Updated Secret Shadows
In multi-secret sharing, a number of secrets are shared among a group of participants in a
single-secret sharing process. Each participant gets only one share from the sharing …
single-secret sharing process. Each participant gets only one share from the sharing …