2016 International Conference System Modeling &Amp; Advancement in Research Trends (SMART) 2016
DOI: 10.1109/sysmart.2016.7894500
|View full text |Cite
|
Sign up to set email alerts
|

Secured high capacity Steganography using distribution technique with validity and reliability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…In [15] author presented a steganography approach based on DWT in which more than one secret image are embedded in one cover image. In [16], presented high capacity LSB based steganography utilizing distributed approach making stego-images stronger against several steganalysis attacks as decomposed secret information are equitably distributed among various cover images file making it harder to decide its reality, however this approach does not use appropriate scheme to reassemble circulated images.…”
Section: Related Workmentioning
confidence: 99%
“…In [15] author presented a steganography approach based on DWT in which more than one secret image are embedded in one cover image. In [16], presented high capacity LSB based steganography utilizing distributed approach making stego-images stronger against several steganalysis attacks as decomposed secret information are equitably distributed among various cover images file making it harder to decide its reality, however this approach does not use appropriate scheme to reassemble circulated images.…”
Section: Related Workmentioning
confidence: 99%
“…The three basic ideas behind robust steganography are embedding capacity, invisibility and imperceptibility. There is a tradeoff among these features to obtain high-quality steganography [3][4][5][6].…”
Section: A Introduction Of Steganographymentioning
confidence: 99%
“…Cryptography has its own significance to protect the secret information by making nonunderstandable, on the other hand, its weakness is encryption information can make the suspicious about its privacy and can be tempered by the third party though preferred standpoint of steganography is, it protects the secret information by embedding it into another digital file thus making the secret information imperceptible so there is less probability of susceptibility. Steganography is a developing research field keeping in mind the goal to provide state-of-the-art development of information security framework [1].…”
Section: Introductionmentioning
confidence: 99%