2015
DOI: 10.5815/ijigsp.2015.06.02
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Image Steganography Tool using LSB Scheme

Abstract: Abstract-As a consequence of the fact, transmitting data has been fast and easy these days due to the development of the Internet. Where internet is the most important medium for confidential and non-confidential communications. Security is the major matter for these communications and steganography is the art of hiding and transmitting secret messages through carriers without being exposed. This paper presents a secured model for communication using image steganography. The main concern is to create a Java-ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…In this phase, customer extracts stego-image from the optimal image using LSB reveal method. The following steps are involved for retrieving cipher text from optimal image [ 3 ]. Firstly, customer read the stego-image.…”
Section: Proposed Workmentioning
confidence: 99%
“…In this phase, customer extracts stego-image from the optimal image using LSB reveal method. The following steps are involved for retrieving cipher text from optimal image [ 3 ]. Firstly, customer read the stego-image.…”
Section: Proposed Workmentioning
confidence: 99%
“…In [33,34], the authors used all four frequency bands of DWT combined SVD for watermarking. The experimental results show that Lin et al's method [30] gives the best magnitude of wavelet coefficient and singular values [35,36].…”
Section: Related Workmentioning
confidence: 99%
“…Plain text is the text which has the original message or data which is not encrypted and the ciphertext is the text which is ready to be used after the encryption of the message. A key is required for both the encryption and decryption of the data or message [15][16][17][18][19][20].…”
Section: Figure 1 Basic Modelmentioning
confidence: 99%
“…Singular values of Watermark are inserted into all four frequency bands singular values after first stage DWT. Experimental results show that LL gives the best magnitude of wavelet coefficient as well as of singular values [4,19].…”
Section: Related Workmentioning
confidence: 99%