Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 21-30 of 48 total results
 A Secure Image Steganography Based on RSA Algorithm and ...
The Least Significant Bit insertion varies according to number of bits in an image [16]. For an 8-bit image, the least significant bit i.e. the 8th bit of each byte of the image will be changed by the 1-bit of secret message. For 24 bit image, the colors of each component like RGB (red, green and blue) will be changed. LSB steganography...
 A Novel Approach for Image Steganography using LCG
modification, interception and sniffing normally exist. Steganography is a common security technique that is utilized to solve or reduce those problems. A large number of methods is used for implementing steganography; as least significant bits (LSB), discrete cosine transform (DCT), discrete Fourier...
A Secure Text Steganography Technique based on Hybrid ...
Steganography is the art and science of secret communications. It is the practice of encoding/embedding secret information in a way such that the subsistence of the information is invisible. The ...
 Hiding And Encrypting Binary Images Using A Different Approach
Image steganography techniques can be divided into following domains. 1. Spatial Domain Methods: There are many versi ons of spatial steganography, all directly change some bits in the image pixel values in hiding data. Least significant bit (LSB) -based steganography is...
Classification of Image Steganography Techniques in ...
Y. K. Jain, and R. R. Ahirwal, “A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys”, International Journal of Computer Science and Security, vol.4, no.1, pp.40-49, 2010. M. K.
Comparative Study of Spatial Domain Image Steganography ...
In this method the messages are embedded into cover image by replacing the least significant bits of the image directly. The hiding capacity can be increased by using up to 4 least significant bits in each pixel which is also quite hard to detect [16, 18, 3]. 1.2 MSB Steganography This method is a slight modification of the LSB steganography....
Yogendra Kumar Jain | Semantic Scholar
Semantic Scholar profile for Yogendra Kumar Jain, with 20 highly influential citations and 105 scientific research papers.
Volume III Issue II | International Journal of Research ...
[25] Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego Keys”, International Journal of Computer Science and Security, Vol. 4, March 2010.
EasyStego: Robust Steganography Based on Quick-Response ...
This method is based on the use of the DES and RSA algorithms to achieve secret-message encryption, which increases the difficulty of cracking secret messages. Ramesh et al. proposed an image-steganography scheme based on frequency-domain processing. It uses discrete-wavelet transform (DWT) to conceal secret messages in the carrier image as a ......
A Secure Image Steganography based on RSA Algorithm and ...
The Hash based Least Significant Bit (H-LSB) technique for steganography in which position of LSB for hiding the secret data is deermined using hash function. Hash function finds the positions of least significant bit of each RGB pixels and then message bits are embedded into these RGB pixels independently....
1 2 3 4 5
Pages
|