Proceedings of 2011 International Conference on Computer Science and Network Technology 2011
DOI: 10.1109/iccsnt.2011.6181922
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of image steganography techniques in secure online voting

Abstract: As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 13 publications
(14 reference statements)
0
1
0
1
Order By: Relevance
“…Penilaian sebuah algoritma steganografi yang baik dapat dinilai dari beberapa faktor yaitu: 1. Imperectibility [1], [10], [11] Keberadaan pesan rahasia dalam media penampung tidak dapat dideteksi oleh inderawi. Misalnya jika covertext berupa citra, maka penyisipan pesan membuat citra stegotext sukar dibedakan oleh mata dengan covertext-nya.…”
Section: B Aspek-aspek Steganografiunclassified
“…Penilaian sebuah algoritma steganografi yang baik dapat dinilai dari beberapa faktor yaitu: 1. Imperectibility [1], [10], [11] Keberadaan pesan rahasia dalam media penampung tidak dapat dideteksi oleh inderawi. Misalnya jika covertext berupa citra, maka penyisipan pesan membuat citra stegotext sukar dibedakan oleh mata dengan covertext-nya.…”
Section: B Aspek-aspek Steganografiunclassified
“…The system must create a compatible source image containing the ballot for visual cryptography encryption by passing a secret message derived from the decrypted stego-image. Because of the visual cryptography encryption, half of the shares need to be obtained by the voters [27] - [28].…”
Section: Implementation Of the Voting Systemmentioning
confidence: 99%