2015 Fifth International Conference on Communication Systems and Network Technologies 2015
DOI: 10.1109/csnt.2015.193
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Authentic DCT Image Steganography through DWT - SVD Based Digital Watermarking with RSA Encryption

Abstract: With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide Web) services, we can retrieve many kinds of information anytime. Thus,security has become one of the most significant ptoblems for distributing new information.It is necessary to protect this information while communicated over insecure channels.Thus a need for developing technology that will help to provide security as well as authenticity.Steganography is the idea of hiding private or sensitive data or information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…The three types often involve a tradeoff between imperceptibility, robustness, and capacity. The irreversible watermarking methods are lossy in nature as they introduce permanent alterations to the original images even after the extraction of the embedded watermarks [17][18][19]. Reversible methods, on the other hand, are lossless since they retain the original image after extracting the embedded watermarks [20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…The three types often involve a tradeoff between imperceptibility, robustness, and capacity. The irreversible watermarking methods are lossy in nature as they introduce permanent alterations to the original images even after the extraction of the embedded watermarks [17][18][19]. Reversible methods, on the other hand, are lossless since they retain the original image after extracting the embedded watermarks [20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…This would be beneficial to nation for overall security. [1] Amitava Nag et. al., [13] presents a novel technique for Image steganography based on DWT.…”
Section: Literature Surveymentioning
confidence: 99%
“…It's a form of signal dispensation the place input is an image, like video body or picture and output would even be an image or characteristics involving that image. In image Processing approach pix are handled as two dimensional indicators at the same time applying already set sign processing ways to them [1].…”
Section: Introductionmentioning
confidence: 99%
“…There are many popular cryptographic techniques such as Blowfish, DES, RSA, AES, and One Time Pad (OTP) [18][19][20]. OTP is the method that is processed per block and simplest compared to other methods.…”
Section: Introductionmentioning
confidence: 99%
“…Many such studies on [14][15][16][17][18], combine steganographic techniques with cryptography to enhance the security of secret messages. There are many popular cryptographic techniques such as Blowfish, DES, RSA, AES, and One Time Pad (OTP) [18][19][20].…”
Section: Introductionmentioning
confidence: 99%