2015 International Conference on Computational Intelligence and Communication Networks (CICN) 2015
DOI: 10.1109/cicn.2015.227
|View full text |Cite
|
Sign up to set email alerts
|

Steganography Based Secret Image Sharing Using Block Division Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Joshi et al [15] presented the new software-based approach for image hiding and extraction using the 7th bit of pixel replacement by new temporary pixel and also analyze the performance metrics for different images with image quality improvements. Tulsidas et al [16] present a new way of image steganography by using block division method. The block division method generates the maximum pixel value from each block as key and block wise, divide each pixel by maximum value and embedded with cover to generate the stegano image.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Joshi et al [15] presented the new software-based approach for image hiding and extraction using the 7th bit of pixel replacement by new temporary pixel and also analyze the performance metrics for different images with image quality improvements. Tulsidas et al [16] present a new way of image steganography by using block division method. The block division method generates the maximum pixel value from each block as key and block wise, divide each pixel by maximum value and embedded with cover to generate the stegano image.…”
Section: Related Workmentioning
confidence: 99%
“…The digital watermarking application using image steganography is presented in Chandran et al [20] using different approaches like Discrete Cosine Transform (DCT), DWT, and LSB methods. Most of the recent image steganography articles from [9][10][11][12][13][14][15][16][17][18][19][20] are software-based approaches. Almutairi et al [21] presented the hardware-based steganography using secured LSB method with security, and similarly, the hybrid approach using Haar DWT and Modified LSB method for steganography is made by Simha et al [22] on a hardware platform.…”
Section: Related Workmentioning
confidence: 99%