2021 International Conference on Microelectronics (ICM) 2021
DOI: 10.1109/icm52667.2021.9664947
|View full text |Cite
|
Sign up to set email alerts
|

Utilization of Corner Filters, AES and LSB Steganography for Secure Message Transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Dataset labeled to train the classifier in 80% while 20% used for testing mode. To fit parameter of (𝜃) use (11):…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Dataset labeled to train the classifier in 80% while 20% used for testing mode. To fit parameter of (𝜃) use (11):…”
Section: Resultsmentioning
confidence: 99%
“…The watermark cannot remove information from it unless part of the image information is damaged, and this information is often. It is subject to change because it is among the least important area in the image, or the so-called LSB [11]. Among the security information that has a hidden character, including fingerprints, and Iris of our most interest in the technique of hiding information, which is the focus of our research is to include a message in the cover of the image, which is considered the main carrier in information transmission technologies.…”
Section: Steganographymentioning
confidence: 99%
“…In several research works, stenography techniques are combined with other cryptography algorithms to enhance the security and privacy of hidden secret data. In [ 31 ], the authors combined cryptography and stenography techniques to obtain a high security standard. Initially, the data was encrypted using an AES algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, the authors of [ 33 ] have also adopted the AES algorithm as a security technique to encrypt the data before hiding it with the carrier file. However, in [ 31 ], two schemes were proposed in which LSB stenography is applied along with image processing and cryptography in order to secure sensitive data. Moreover, the authors of [ 34 ] have proposed a new embedding algorithm in which they apply sequential multiples for LSB real-time data hiding algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…While some researchers have focused their efforts into advancing cryptographic algorithms [6][7][8][9], others have dedicated their efforts towards the field of steganography [10,11].…”
Section: Introductionmentioning
confidence: 99%