2019
DOI: 10.11591/ijeecs.v14.i3.pp1412-1419
|View full text |Cite
|
Sign up to set email alerts
|

A new encrypted method in image steganography

Abstract: <p>Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a cover image using Image steganography. CAPTCHA are the crazy codes. They are used in human response test. The word is actually an acronym for: "<strong>C</strong>ompletely <strong>A</strong>utomated <strong>P</strong>ublic <strong>T</strong>uring test to tell <strong>C</strong>omputers and <strong>H</strong>umans <strong>A</strong>p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Cb represents blue subtract luma (B -Y) while Cr represents red subtract luma (R -Y). There are several reasons that the YCbCR color system space should be used with color display systems, as detailed in [15]: 1. The illumination variation problem can be solved using the luminance component (Y) and, as the color is independent, it allows for easy programming.…”
Section: Ycbcr Color Spacementioning
confidence: 99%
“…Cb represents blue subtract luma (B -Y) while Cr represents red subtract luma (R -Y). There are several reasons that the YCbCR color system space should be used with color display systems, as detailed in [15]: 1. The illumination variation problem can be solved using the luminance component (Y) and, as the color is independent, it allows for easy programming.…”
Section: Ycbcr Color Spacementioning
confidence: 99%
“…Cryptography is a technique that secures the transferred data, which concerns about confidentiality, integrity, and availability of the information [2]. Besides that, steganography is the technique that conceal the data into the same or in a different form to create a cover that holds the secret data called the cover medium which is to protect them from spying attacks [3].…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, people utilized steganography in both legitimately and illegitimately methods [2]. For instance, residents may probably practice it to look after their privacy while terrorists or criminal utilize it for transferring ferocity information [3]. There are two kinds of steganalysis, known as targeted steganalysis and steganalysis that is blind or universal [4].…”
Section: Introductionmentioning
confidence: 99%