2014
DOI: 10.1016/j.compeleceng.2013.11.006
|View full text |Cite
|
Sign up to set email alerts
|

Data hiding in scrambled images: A new double layer security data hiding technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(10 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…Shabir A. Parah et al, [21] proposed another crypto area information disguising technique subject to Intermediate Significant Bit Plane Embedding (ISBPE). The cover picture was encoded and the data to be connected was mixed, and after that presented in the Intermediate Significant Bit (ISB) planes of the scrambled cover picture, at the zones coordinated by a Pseudo-random Address Vector (PAV).…”
Section: Related Workmentioning
confidence: 99%
“…Shabir A. Parah et al, [21] proposed another crypto area information disguising technique subject to Intermediate Significant Bit Plane Embedding (ISBPE). The cover picture was encoded and the data to be connected was mixed, and after that presented in the Intermediate Significant Bit (ISB) planes of the scrambled cover picture, at the zones coordinated by a Pseudo-random Address Vector (PAV).…”
Section: Related Workmentioning
confidence: 99%
“…Digital scramblers in general can be used to protect against wiretapping and to protect copyrights. Nonetheless, scramblers are usually used as a step in an algorithm, for example, image scramblers are used as a phase or even before and/or after some security related algorithm, such as data hiding (Parah, Sheikh, Hafiz, & Bhat, 2014) , watermarking (Wang & Li, 2015) and encryption algorithms (Li, et al, 2013), (Liu & Sheridan, 2013), (Wu, Guo, Liang, & Zhou, 2014), and (Zhong, Chang, Shan, & Hao, 2012).…”
Section: Related Workmentioning
confidence: 99%
“…The vast majority of information is stored as digital media. As a results the information security has become a very important research topic in order to provide security of digital media, thus information security has become a hot-topic research area [1]. In the information security, cryptography and data hiding are widely used.…”
Section: Introductionmentioning
confidence: 99%