[PDF][PDF] Bit inverting map method for improved steganography scheme

AM Fadhil - Diss. Universiti Teknologi Malaysia, 2016 - core.ac.uk
Achieving an efficient and accurate steganography scheme for hiding information is the
foremost priority in the information and communication technology era. The developed …

A new secret image sharing with arithmetic coding

SK Das, BC Dhara - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
In this paper, we have proposed a new (t, n) secret image sharing scheme. In the proposed
method the secret image is pre-processed block wise so that image becomes more suitable …

Hiding Images in the Spatial Domain

SAS Almola - Informatica, 2023 - informatica.si
Nowadays, steganography has become a useful technology and the interest in it has
increased due to the rapid growth in the use of the internet, and it is applied to transmit …

Arithmetic coding based secret image sharing with inverted pattern lsb substitution for share hiding to achieve better quality stego images

SK Das, BC Dhara - International Journal of Computers and …, 2016 - Taylor & Francis
In this paper we have proposed a secret image sharing method using arithmetic coding. The
proposed method is inspired from the work presented in [25]. Objectives of the proposed …

[PDF][PDF] 非等量备份和双认证自修复有限域图像分存

欧阳显斌, 邵利平, 乐志芳 - 软件学报, 2017 - jos.org.cn
传统有意义图像分存方案存在认证能力偏低, 攻击后不具备修复能力或修复能力整体较弱以及
嵌入掩体视觉质量不高等问题. 针对以上问题, 提出一种结合非等量备份和双认证自修复有限域 …

Extended LBP Based Secret Image Sharing with Steganography

S Kumar Das, B Chandra Dhara - … : Proceedings of ICTIS 2020, Volume 1, 2021 - Springer
We have presented a new (k, n) threshold secret image sharing technique in this paper. The
secret image is first encoded under the proposed structure that uses the extended LBP …

Extended LBP Based Secret Image Sharing with Steganography

SK Das, BC Dhara - … for Intelligent Systems: Proceedings of ICTIS …, 2020 - books.google.com
We have presented a new (k, n) threshold secret image sharing technique in this paper. The
secret image is first encoded under the proposed structure that uses the extended LBP …

[PDF][PDF] A Systematic Analysis of Advanced E-Banking Transactions Using Visual Cryptography Techniques

S Singh, AK Dwivedi - journal-dogorangsang.in
Image cryptography is another subject of study that is acquiring fame. For cryptography,
various procedures have been created after some time. Various encryption calculations …

[PDF][PDF] Advanced E-Banking Transactions Using Visual Cryptography Techniques

S Singh, AK Dwivedi - journal-dogorangsang.in
Specialists have concocted a wide range of safety techniques to defend computerized data.
By putting away touchy data in a way that is dispersed over numerous areas, safety efforts …

A (tn) Multi-secret Sharing Scheme with Updated Secret Shadows

S Kandar, BC Dhara - Proceedings of the International Conference on …, 2018 - Springer
In multi-secret sharing, a number of secrets are shared among a group of participants in a
single-secret sharing process. Each participant gets only one share from the sharing …