2014
DOI: 10.14257/ijsia.2014.8.6.19
|View full text |Cite
|
Sign up to set email alerts
|

Steganography Technique for JPEG2000 Compressed Images Using Histogram in Wavelet Domain

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…In general, information-hiding techniques are categorised into two classes: invisible watermarking [1][2][3] and steganography [4][5][6][7]. Invisible watermarking is employed for copyright protection, traitor tracing, and digital authentication.…”
Section: Introductionmentioning
confidence: 99%
“…In general, information-hiding techniques are categorised into two classes: invisible watermarking [1][2][3] and steganography [4][5][6][7]. Invisible watermarking is employed for copyright protection, traitor tracing, and digital authentication.…”
Section: Introductionmentioning
confidence: 99%