2014 14th International Conference on Hybrid Intelligent Systems 2014
DOI: 10.1109/his.2014.7086199
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of modified triple — A steganography technique using Fisher Yates algorithm

Abstract: Steganography is a science of embedding private, confidential, sensitive data or information within the given cover media without making any visible changes to it. In this paper, we present a modified Triple-A method for RGB image based steganography. This method introduces the concept of storing variable number of bits in each channel (R, G or B) of pixel. We come out with extended Randomize pixel Steganography algorithm without any limitations on the type of images being used. In this analysis, we focus on t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…This paper provides a robust and secure LSB substitution based method using Pseudo Random Number Generator (PRNG) that can hide a large volume of data. Comparing with the other methods [14,15] for embedding high capacity data using similar approach such as PRNG or Hash function, the proposed method produces good and encouraging results. In the next section, the literature survey of the similar steganographic techniques is discussed.…”
Section: Introductionmentioning
confidence: 85%
See 1 more Smart Citation
“…This paper provides a robust and secure LSB substitution based method using Pseudo Random Number Generator (PRNG) that can hide a large volume of data. Comparing with the other methods [14,15] for embedding high capacity data using similar approach such as PRNG or Hash function, the proposed method produces good and encouraging results. In the next section, the literature survey of the similar steganographic techniques is discussed.…”
Section: Introductionmentioning
confidence: 85%
“…Later on considering the nature of human vision system and sensitivity of light [13], some other methods were proposed in [14] called 4-4-4 and 3-3-2 methods. In first one, authors proposed the method for the situation where high capacity data transfer is more considerable than the security.…”
Section: Related Workmentioning
confidence: 99%
“…This section compares the proposed data hiding technique with state-of-the-art data hiding methods. The comparison is made based on hiding capacity HC, peak signal to noise ratio PSNR, and structure similarity index SSI M. The proposed technique is compared with well-know data hiding techniques of Honsinger et al [9], Macq and Dewey [50], Fridrich et al [8], Lin and Li [51], Jaiswal et al [52], Goljan et al [53], Vleeschouwer et al [54], Khan et al [55], Alam et al [56], Wang et al [57], Khan and Tiziano [20], Khamrui and Mandal [58], Chang et al [28], Lee and Chen [59], Lin and Shiu [29], Koikara and Goswami [60], Hou et al [61], Wang et al [62], and Huang et al [63]. The comparison is made using three different cover images (Lena, Mandrill, and Pepper).…”
Section: Comparisonmentioning
confidence: 99%
“…To safeguard the electronic documents from potential hackers, public-key cryptography [1,3,6] known as digital signatures are used to authenticate the data sent over the channels. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and protection in transmission of information in digital form [9]. Encryption can protect the privacy of data, but other methods are still needed to protect the integrity and authenticity of data.…”
Section: Introductionmentioning
confidence: 99%