2010
DOI: 10.5120/1671-2252
|View full text |Cite
|
Sign up to set email alerts
|

Security Building at the Line of Control for Image Stego

Abstract: Security has virtually become an indispensable non-functional requirement for any technology that deals with data. Traditional methods of imparting security using encryption have given away themselves long ago to cryptanalytic ventures. A different method of secure data transfer without revealing the mere existence of secret, called Steganography is a promising technique to ensure security. This technique camouflages secret data into a casual cover image, without affecting its visually perceived quality. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…In the above given equation I max is the maximum the maximum intensity in the cover image. On the basis of these parameters we are comparing our method with the hybrid edged approach explained in [24] and with the performance of other basic edge detectors based steganography using 6 bits of edge pixel and 2 bits of smooth pixel. The following table shows the results of applying different edge detectors used in these techniques.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the above given equation I max is the maximum the maximum intensity in the cover image. On the basis of these parameters we are comparing our method with the hybrid edged approach explained in [24] and with the performance of other basic edge detectors based steganography using 6 bits of edge pixel and 2 bits of smooth pixel. The following table shows the results of applying different edge detectors used in these techniques.…”
Section: Resultsmentioning
confidence: 99%
“…This technique combined the results of all basic edge detectors. After getting the final edge matrix 6 bits of edge pixel and 2 bits of smooth area pixel are used for embedding the secret message bits [24].…”
Section: Literature Surveymentioning
confidence: 99%