2011
DOI: 10.1016/j.jss.2011.06.021
|View full text |Cite
|
Sign up to set email alerts
|

A high quality image sharing with steganography and adaptive authentication scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 69 publications
(21 citation statements)
references
References 28 publications
0
19
0
Order By: Relevance
“…In the study [2] process to keep the data integrity secured is done by using HMAC (Hash Message Authentication Code) and PSNR quality is also quite good with 43,54 db. While in the study [12] data integrity is using Huffman encoding techniques with a good quality PSNR of 61,48 db.…”
Section: Information Securitymentioning
confidence: 99%
“…In the study [2] process to keep the data integrity secured is done by using HMAC (Hash Message Authentication Code) and PSNR quality is also quite good with 43,54 db. While in the study [12] data integrity is using Huffman encoding techniques with a good quality PSNR of 61,48 db.…”
Section: Information Securitymentioning
confidence: 99%
“…Chan and Cheng [10] proposed a simple LSB substitution-based hiding technique, and Wang et al [104] proposed an image-hiding method based on optimal LSB substitution and a genetic algorithm. Wu et al [111] proposed a secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions.…”
Section: Steganographymentioning
confidence: 99%
“…The categories of lossless embedding schemes: spatial domain [6,7], convert schemes [9], cryptography based [3,10], and compressed domain schemes [4,11]. The spatial domain method can be divided into difference expansion (DE), and histogram shifting.…”
Section: Introductionmentioning
confidence: 99%