2018 28th International Conference Radioelektronika (RADIOELEKTRONIKA) 2018
DOI: 10.1109/radioelek.2018.8376370
|View full text |Cite
|
Sign up to set email alerts
|

Cover selection steganography with intra-image scanning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The amount of applications for image encryption algorithms is still rising. Probably the most obvious one is usage of encryption prior to information hiding via steganography [14,15]. The image encryption algorithms could be also used for modification of image data into a set of samples with more uniform distribution, which could be helpful for some processing operations [16].…”
Section: Discussionmentioning
confidence: 99%
“…The amount of applications for image encryption algorithms is still rising. Probably the most obvious one is usage of encryption prior to information hiding via steganography [14,15]. The image encryption algorithms could be also used for modification of image data into a set of samples with more uniform distribution, which could be helpful for some processing operations [16].…”
Section: Discussionmentioning
confidence: 99%
“…Considering these advantages, MOEA is also used in steganography to optimise features, either capacity, imperceptibility, or robustness. For instance, a recent study by Hajduk and Levický (2018) combined both MOEA and steganography for image steganography and implemented NSGA to optimise the stego file. The study proposed a new method of embedding a secret message within the discrete wavelet transform using singular value decomposition (SVD) and NSGA.…”
Section: Moeamentioning
confidence: 99%
“…However, the result may not always be good since it depends on the cover file and the secret message (Shah & Bichkar, 2020). The main idea is to find the optimal cover file from its database using a specific search method for the specific secret message (Hajduk & Levický, 2018). If the criterion of a good cover file is met based on comparison parameters, the relevant cover file will be used as a carrier for the secret message.…”
Section: Cover Selectionmentioning
confidence: 99%
See 1 more Smart Citation