Web
Education
Viewing 1-3 of 3 total results
A Novel Approach for Image Steganography using LCG
modification, interception and sniffing normally exist. Steganography is a common security technique that is utilized to solve or reduce those problems. A large number of methods is used for implementing steganography; as least significant bits (LSB), discrete cosine transform (DCT), discrete Fourier...
EasyStego: Robust Steganography Based on Quick-Response ...
This method is based on the use of the DES and RSA algorithms to achieve secret-message encryption, which increases the difficulty of cracking secret messages. Ramesh et al. proposed an image-steganography scheme based on frequency-domain processing. It uses discrete-wavelet transform (DWT) to conceal secret messages in the carrier image as a ......
Reversible Secure Steganography Based On Lifting Transform ...
The secret image can now be extracted from this image using the following steps: Represent the stego image G in YCbCr color space.Find the integer wavelet transform of Cr component of the stego image G. Obtain the key from the least significant bit planes of the higher frequency components of the transformed image....
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.