2018
DOI: 10.1109/access.2018.2815037
|View full text |Cite
|
Sign up to set email alerts
|

Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 30 publications
0
7
0
1
Order By: Relevance
“…In fact, that computational overhead motivated the development of the proposed technique to modify LSB steganography. Similarly, LSB-M [18] first identifies the intensity clusters in the image and then hides data inside those clusters, again a time-complex process, which is not suitable for video steganography. Other techniques including a DWT-Haar wavelet-based method [13], hash-LSB [17] and secret key LSB [14] suffer the same problems of not being able to run fast enough to match the video speed.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In fact, that computational overhead motivated the development of the proposed technique to modify LSB steganography. Similarly, LSB-M [18] first identifies the intensity clusters in the image and then hides data inside those clusters, again a time-complex process, which is not suitable for video steganography. Other techniques including a DWT-Haar wavelet-based method [13], hash-LSB [17] and secret key LSB [14] suffer the same problems of not being able to run fast enough to match the video speed.…”
Section: Resultsmentioning
confidence: 99%
“…This spatial approach ensures that the overall visual aesthetic of the image is not significantly altered. Initial research into LSB steganography concentrated on designing the system to increase the payload capacity by utilizing most of the cover-image pixels [10]- [18]. However, steganalysis techniques soon became strong enough to break such systems using statistical analysis, which was developed to identify the regular patterns by which data were stored inside the cover [19]- [21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Those video syntax elements, encrypted as part of a selective encryption (SE) scheme, also preserve decoder format compliance, in the sense that the encrypted video can still be processed even if the selected syntax elements are not decrypted [ 9 ]. Notice also that if the authors’ contribution in [ 10 ] is applied, keys may alternatively be embedded within the encrypted video itself through the joint application of steganography and cryptography, though that aspect is outside the scope of the current paper.…”
Section: Introductionmentioning
confidence: 99%
“…Since roads are a principal part of modern transportation, managing and updating road information in the Geographic Information System database is of great concern [1]. Road information is fundamental geographical information playing an important role in many applications, e.g., serving as reference for the recognition of other objects and travel recommendation [2], road navigation, geometric correction of images, and even assisting confidential transmission of color images [3]. Automatic road extraction is an effective and economic way to obtain road information.…”
Section: Introductionmentioning
confidence: 99%