Web
Education
Digital Image Steganography Using Variable Length Group Of ...
A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys. International Journal of Computer Science and Security. 2010, 4(1):40-49. 10.
(PDF) A novel steganography technique by mapping words ...
We have proposed a new steganography method deploying adaptive least significant bit (LSB) substitution and PVD. The gray scale image is partitioned in 3×3 or 3×3 plus 2×2 pixel blocks.
US7454020B2 - System and method for encrypting data in ...
Method for embedding adaptive data for image quality improvement US6768980B1 (en) * 1999-09-03: 2004-07-27 ... A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys: Suthaharan:
IJCA - Pixel Value Differencing a Steganographic method: A ...
Yogendra Kumar Jain, R. R. Ahirwal, "A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys", International Journal of Computer Science and Security vol. (4), issue (1), pg no. 40-49.
A New Optimization Strategy for Solving the Fall-Off ...
Y. K. Jain , A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys, Int. J. Comput. Sci. Secur. (IJCSS) 4 (March 2010) 40–49. Google Scholar; 8. J. C.
IJCA - Color Image Steganography using Combined Pixel ...
Jain Y. K. and Ahirwal R. R. , "A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys", International Journal of Computer Science and Security (IJCSS), vol. 4, March 2010. Niveditta Thakur, Swapna Devi, "A New Method for Color Image Quality Assessment".
CiteSeerX — www.arcjournals.org ©ARC Page 1 High ...
To enhance the embedding capacity of image steganography and watermarking for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges is proposed in this paper....
Encryption Based Approach to Find Fake Uploaders in Social ...
[8] Y. K. Jain and R. R. Ahirwal, A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys, International Journal of Computer Science and Security (IJCSS), vol. 4, (2010) March 1. [9] Mohammad A. Ahmad, Dr. Imad Alshaikhli, Sondos O. [10]
Medical JPEG image steganography based on preserving inter ...
Suppose the cover JPEG image X consists of four DCT coefficients blocks, a simple example of the proposed scheme is shown in Fig. 3.The initial cost value C of the cover image can be computed, and the cover image is divided into four sub-images S 1, S 2, S 3, S 4.We first embed sub-messages into sub-image S 1 based on its cost values ρ +, ρ − that are equal to the initial cost value....
Technical seminar report - LinkedIn SlideShare
Yogendra Kumar Jain, R.R. Ahirwal, “ A Novel Image Steganography Method withAdaptive number of Least Significant Bits Modification Based on Private Stego-Keys”, IJCSS, vol. 4, Issue 1.2. F. A.
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.