2021
DOI: 10.32604/cmc.2021.015329
|View full text |Cite
|
Sign up to set email alerts
|

Coverless Image Steganography Based on Jigsaw Puzzle Image Generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Saad [10] proposes a coverless image steganography method using jigsaw puzzle image generation using secret message bits. The image is divided into equal rows and columns, creating blocks with tabs/blanks.…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Saad [10] proposes a coverless image steganography method using jigsaw puzzle image generation using secret message bits. The image is divided into equal rows and columns, creating blocks with tabs/blanks.…”
Section: Related Studiesmentioning
confidence: 99%
“…Such as 01, 00, 10, 00, 01, 00, 10, 01. So based on above cases, the algorithm will marked the B option circle of the first question for first 2bits (01), same as for second 2 bits (00), the algorithm will marked the A option circle of the second question, for thirds 2 bits (10), the algorithm will marked the C option circle of the third question, and so on this process is repeated up to last block. The algorithm will complete the mapping process by solving every answer on the sheet in accordance with the secret message, and the answered/mapped bubble sheet will then be prepared for sharing with the recipient.…”
Section: B Mapping Phasementioning
confidence: 99%
“…Such as 01, 00, 10, 00, 01, 00, 10, 01. So based on above cases, the algorithm will marked the B option circle of the rst question for rst 2bits (01), same as for second 2 bits (00), the algorithm will marked the A option circle of the second question, for thirds 2 bits (10), the algorithm will marked the C option circle of the third question, and so on this process is repeated up to last block. The algorithm will complete the mapping process by solving every answer on the sheet in accordance with the secret message, and the answered/mapped bubble sheet will then be prepared for sharing with the recipient.…”
Section: Mapping Phase Phasesmentioning
confidence: 99%
“…In the field of information protection information steganography is one of the prominent addresses among researchers who have enriched this field with a lot of research [3]. Information steganography is the science of delivering confidential [4] information to the concerned parties through public channels in a hidden manner that no one can notice or realize and this is achieved by concealing it with a digital medium such as sound, image, video and text [5,6].…”
Section: Introductionmentioning
confidence: 99%