2018
DOI: 10.1016/j.procs.2018.05.160
|View full text |Cite
|
Sign up to set email alerts
|

Image Steganography Using Mid Position Value Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Furthermore, , the use of transformation-based watermarking to secure medical images and patients' records and information is analyzed in [27] with examples of embedding image hiding technique into an image scheme can be found in [28][29][30][31][32]. This is also called steganography [33][34][35][36][37][38][39] by which a certain amount of information can be hidden [40,41]. For the purpose of hiding a medical image, one of the techniques is to embed an image to another.…”
Section: Dss-applied Watermarking Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, , the use of transformation-based watermarking to secure medical images and patients' records and information is analyzed in [27] with examples of embedding image hiding technique into an image scheme can be found in [28][29][30][31][32]. This is also called steganography [33][34][35][36][37][38][39] by which a certain amount of information can be hidden [40,41]. For the purpose of hiding a medical image, one of the techniques is to embed an image to another.…”
Section: Dss-applied Watermarking Techniquesmentioning
confidence: 99%
“…Cryptographic methods are proposed to be effective and applicable with nano-communication and its related sensor networks as proposed by [36]. Additionally, in the field of mobile communication [37], it is proposed that the use of cryptographic technique with a digital proxy signature security scheme might be able to produce more computation power than other competitive security schemes. Also, cryptographic methods have been used in medical images and information systems to ensure reliability and authentication of systems.…”
Section: Dss-applied Cryptographic Techniquesmentioning
confidence: 99%
“…The steganography technique where the embedding algorithm is allowed to choose any cover media to make the stego image least detectable is proposed by Kumar, V. and Kumar, D. [5]. The Mid position value-based image steganography method is presented where Arnold transform is applied to scramble the cover image and mid position value (MPV) over a scrambled cover image is applied to insert bits of a secret image [27]. Integer Wavelet Transform (IWT) is applied to the images and for scrambling of the secret image; the Arnold transform is applied in the study [28].…”
Section: Related Workmentioning
confidence: 99%
“…Srilekha Mukherjee et al [15] was used Arnold's transformation and the Mid Position Value (MPV) for hiding the secret data. Arnold's transformation was imposed upon the selected cover image in first stage.…”
Section: Literature Surveymentioning
confidence: 99%