2018
DOI: 10.1007/s11042-018-6237-5
|View full text |Cite
|
Sign up to set email alerts
|

Steganographic approach to enhancing secure data communication using contours and clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The paper demonstrates that the model provides secure text content transmission with the cover image through communication channels. Authors Manikandan et al [7] have presented a lossless steganography system that generally adheres to clustering and contouring principles on grayscale photos. Hua et al [8] an image encryption scheme using value-differencing transformation and modified zigzag transformation.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…The paper demonstrates that the model provides secure text content transmission with the cover image through communication channels. Authors Manikandan et al [7] have presented a lossless steganography system that generally adheres to clustering and contouring principles on grayscale photos. Hua et al [8] an image encryption scheme using value-differencing transformation and modified zigzag transformation.…”
Section: Literature Surveymentioning
confidence: 99%
“…7 and 8 show the evolution of the nominated method's MSE and PSNR values on various image sizes. The proposed approach was compared with various existing steganography models [7] for embedding secret Content, which is listed in Table 6, and graphical Content is shown in Fig. 9.…”
Section: Mse Colorimagementioning
confidence: 99%
“…So, for example, the authors of the paper [9] used edge detection on the cover object, while Abid Yahya in [10] provided comparative characteristics of adaptive steganographic methods (in certain areas of the carrier) using Scale-Invariant Feature Transform (SIFT) and Speeded-Up Robust Features (SURF) algorithms for selecting specific carrier areas. In [11], clustering was proposed, but within previously defined contours, conceiving this method as key-based. The previous works were selected because at the end of this paper, a comparative analysis of the obtained results with those obtained in [5,7,9] will be performed.…”
Section: Review Of the Papers Relevant To This Workmentioning
confidence: 99%
“…The secret stream embodiment process on digital images with the contouring principle for locating the regions of a grayscale image was proposed by Manikandan et al 14 They presented a methodology using the K-means principle to create pixel clusters on the contour regions for the secret content embodiment process at a lossless fashion. The major limitation of the paper is that it works with only grayscale images not with all layers of the color image.…”
Section: Related Workmentioning
confidence: 99%