Proceedings of the 2nd International Conference on Networking, Information Systems &Amp; Security 2019
DOI: 10.1145/3320326.3320353
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Steganography in RRNS based Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…The save (s 1 ) and carry (c 1 ) from the summation in CSA1 are further computed using CPA3 to obtain the third MRD, ϑ 3 in Equation 12. Equations (17) and (18) are obtained by a concatenation process requiring no hardware, and finally the results of Equations (18) and (19) are computed using CPA4 in order to get the binary number X as in Equation 20. The area complexity of this architecture is (7n−4) FA comprising of three (n − 1)-bits full adders (i.e.…”
Section: B Implementation Of the Proposed Schemementioning
confidence: 99%
See 2 more Smart Citations
“…The save (s 1 ) and carry (c 1 ) from the summation in CSA1 are further computed using CPA3 to obtain the third MRD, ϑ 3 in Equation 12. Equations (17) and (18) are obtained by a concatenation process requiring no hardware, and finally the results of Equations (18) and (19) are computed using CPA4 in order to get the binary number X as in Equation 20. The area complexity of this architecture is (7n−4) FA comprising of three (n − 1)-bits full adders (i.e.…”
Section: B Implementation Of the Proposed Schemementioning
confidence: 99%
“…The proposed scheme combines steganography with cryptography; therefore, any attacker would have to apply tools of steganalysis and cryptanalysis in order to discover the existence of message within the stego image and/or discover the scrambled text or image. Most of these attacks are subjective, which makes use of human eye or statistical methods, where mathematical analysis are performed in order to find statistical differences between the altered and non-altered messages, [19]. From the above analysis outlined in Section IV, it is obvious that it will be nearly impossible to notice differences in the stego and original or similarities in the encrypted and original images using either subjective or statistical methods.…”
Section: G Security Analysis Of the Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation