Web
Education
A Secure Image Steganography Based on RSA Algorithm and ...
The Least Significant Bit insertion varies according to number of bits in an image [16]. For an 8-bit image, the least significant bit i.e. the 8th bit of each byte of the image will be changed by the 1-bit of secret message. For 24 bit image, the colors of each component like RGB (red, green and blue) will be changed. LSB steganography...
A Novel Approach for Image Steganography using LCG
modification, interception and sniffing normally exist. Steganography is a common security technique that is utilized to solve or reduce those problems. A large number of methods is used for implementing steganography; as least significant bits (LSB), discrete cosine transform (DCT), discrete Fourier...
A Secure Text Steganography Technique based on Hybrid ...
Steganography is the art and science of secret communications. It is the practice of encoding/embedding secret information in a way such that the subsistence of the information is invisible. The ...
Hiding And Encrypting Binary Images Using A Different Approach
Image steganography techniques can be divided into following domains. 1. Spatial Domain Methods: There are many versi ons of spatial steganography, all directly change some bits in the image pixel values in hiding data. Least significant bit (LSB) -based steganography is...
Classification of Image Steganography Techniques in ...
Y. K. Jain, and R. R. Ahirwal, “A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys”, International Journal of Computer Science and Security, vol.4, no.1, pp.40-49, 2010. M. K.
Comparative Study of Spatial Domain Image Steganography ...
In this method the messages are embedded into cover image by replacing the least significant bits of the image directly. The hiding capacity can be increased by using up to 4 least significant bits in each pixel which is also quite hard to detect [16, 18, 3]. 1.2 MSB Steganography This method is a slight modification of the LSB steganography....
Yogendra Kumar Jain | Semantic Scholar
Semantic Scholar profile for Yogendra Kumar Jain, with 20 highly influential citations and 105 scientific research papers.
Volume III Issue II | International Journal of Research ...
[25] Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego Keys”, International Journal of Computer Science and Security, Vol. 4, March 2010.
EasyStego: Robust Steganography Based on Quick-Response ...
This method is based on the use of the DES and RSA algorithms to achieve secret-message encryption, which increases the difficulty of cracking secret messages. Ramesh et al. proposed an image-steganography scheme based on frequency-domain processing. It uses discrete-wavelet transform (DWT) to conceal secret messages in the carrier image as a ......
A Secure Image Steganography based on RSA Algorithm and ...
The Hash based Least Significant Bit (H-LSB) technique for steganography in which position of LSB for hiding the secret data is deermined using hash function. Hash function finds the positions of least significant bit of each RGB pixels and then message bits are embedded into these RGB pixels independently....
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.