Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-3 of 3 total results
 A Novel Approach for Image Steganography using LCG
modification, interception and sniffing normally exist. Steganography is a common security technique that is utilized to solve or reduce those problems. A large number of methods is used for implementing steganography; as least significant bits (LSB), discrete cosine transform (DCT), discrete Fourier...
EasyStego: Robust Steganography Based on Quick-Response ...
This method is based on the use of the DES and RSA algorithms to achieve secret-message encryption, which increases the difficulty of cracking secret messages. Ramesh et al. proposed an image-steganography scheme based on frequency-domain processing. It uses discrete-wavelet transform (DWT) to conceal secret messages in the carrier image as a ......
Reversible Secure Steganography Based On Lifting Transform ...
The secret image can now be extracted from this image using the following steps: Represent the stego image G in YCbCr color space.Find the integer wavelet transform of Cr component of the stego image G. Obtain the key from the least significant bit planes of the higher frequency components of the transformed image....