2013
DOI: 10.5120/13120-0406
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Pixel-Shuffling based Approach to Simultaneously Perform Double-DCT Image Compression, Encryption and Secondary-Steganography

Abstract: In today's world of advanced and fast growing network, each and every type of digital information is communicated via internet. The demand of the time is the implementation of an effective, sensitive and less time consuming encryption system that can be secured from unauthorized access. Typical encryption systems have played marvelous role for the systematic working of modern day cryptography as it is necessary to encrypt the digital image before their transmission over the network. So, an enhanced approach is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…It is very important to understand the encryption algorithm structure before putting it in the use. Navita Agarwal et al have develope Efficient Pixelshuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography [1]. The authors have conducted a similar research, where they have applied compression, encryption and steganography on the digital image data.…”
Section: Literature Reviewmentioning
confidence: 99%
See 4 more Smart Citations
“…It is very important to understand the encryption algorithm structure before putting it in the use. Navita Agarwal et al have develope Efficient Pixelshuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography [1]. The authors have conducted a similar research, where they have applied compression, encryption and steganography on the digital image data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[Coutesy: Wikipedia] After applying the compression on the hidden object image, the very next step is to hide it inside the decomposed cover object. [1,[5][6][7] The hidden object is hid inside the most similar decomposition matrix of cover object. The similarity between the decomposed matrices and hidden object will be found by using the color based image analysis.…”
Section: When Desired the Image Is Reconstructed Throughmentioning
confidence: 99%
See 3 more Smart Citations