2017 International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2017
DOI: 10.1109/i-smac.2017.8058306
|View full text |Cite
|
Sign up to set email alerts
|

A recent survey on data hiding techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 14 publications
0
6
0
1
Order By: Relevance
“…Namun seiring berjalannya waktu muncul permasalahan baru yaitu dalam hal data message semakin terus bertambah yang ingin disembunyikan ke dalam sebuah cover [6], maka dari itu pada paper ini proposed method, penulis mengacu pada RRBE framework [8] dengan meningkatkan kapasitas dari images pada saat dilakukannya interpolasi sebanyak 2 times dari metode sebelumnya, maka dari itu pada hasil yang diharapkan images mampu menampung message payload sebesar 15%.…”
Section: Pendahuluanunclassified
“…Namun seiring berjalannya waktu muncul permasalahan baru yaitu dalam hal data message semakin terus bertambah yang ingin disembunyikan ke dalam sebuah cover [6], maka dari itu pada paper ini proposed method, penulis mengacu pada RRBE framework [8] dengan meningkatkan kapasitas dari images pada saat dilakukannya interpolasi sebanyak 2 times dari metode sebelumnya, maka dari itu pada hasil yang diharapkan images mampu menampung message payload sebesar 15%.…”
Section: Pendahuluanunclassified
“…After it was generating sequences, it must be tested to know the sequences generated either chaotic or not. For knowing randomness in sequences generated or no, it is generated Gaussian noise to compare correlation of sequences generated with correlation of Gaussian noise as shown Fig (1). For better security, the shape of chaotic maps correlation should be a delta function.…”
Section: Multiple Chaotic Mapsmentioning
confidence: 99%
“…The digitization is becoming unusually energetic in everything; Digital data is appearing everywhere at the present time [1]. In the secure communications, steganography is playing important role.…”
Section: Introductionmentioning
confidence: 99%
“…Here ๐‘ƒ ฬ… , ๐ถ ฬ… is the mean of plain and encrypted image and ๐œŽ ๐‘ƒ and ๐œŽ ๐ถ is the standard deviation of plain as well as encrypted image. Further ๐œŽ ๐‘ƒ๐ถ represents cross-correlation and B1 =(K1 O) 2 and B2 = (K2 O) 2 , where O is dynamic range of pixel values and K1 = 0.02 and K2 =0.03. It's evident from results in table 6.…”
Section: Encryption Qualitymentioning
confidence: 99%
“…Researchers around the globe have introduced substantial approaches along with new and novel assaults to secure digital systems. Recently data concealment techniques to encode and decode the data with the intention to stop any unauthorized access becomes front runner in information security [1], [2]. Cryptography relies on three core principals of authentication, integrity, and privacy.…”
Section: Introductionmentioning
confidence: 99%