2018
DOI: 10.5815/ijigsp.2018.04.02
|View full text |Cite
|
Sign up to set email alerts
|

Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach

Abstract: Abstract-This paper proposes security technique for the confidential data which is the combination of three techniques, first is image compression that is based on wavelet transformation which will compress confidential image and reduce the size of the image, second is cryptography that is based on symmetric key which will encrypt the confidential image, and third is steganography that is based on least significant bit (LSB) which will embedded encrypted information inside a cover image. Therefore the purpose … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…The characteristics of the classifiers should be extracted for machine learning classification. Functional vectors affect the classifiers' performance [ 27 ]. Two methods of extraction, character presence and character count, are generally used specifically.…”
Section: Algorithm For Tf-idfmentioning
confidence: 99%
“…The characteristics of the classifiers should be extracted for machine learning classification. Functional vectors affect the classifiers' performance [ 27 ]. Two methods of extraction, character presence and character count, are generally used specifically.…”
Section: Algorithm For Tf-idfmentioning
confidence: 99%
“…steganography is achieving attraction by people caused by the security issues over the internet. Steganography has retreated a digital strategy of hiding a file in some form of multimedia, such as an image, an audio/video files (Saxena et al, 2018). The aim of steganography is hiding the embedded information in the cover image.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of image processing technology comes the growing need for the enhanced safety of image storage [1][2][3][4], especially in sensitive applications such as face recognition payment, ID verification, license plate recognition, satellite radar imaging and secret military image storage, electronic backup of confidential documents, etc. Cryptographic algorithms are often used in these applications as security assurance.…”
Section: Introduction 1research Backgroundmentioning
confidence: 99%