2019
DOI: 10.3837/tiis.2019.09.025
|View full text |Cite
|
Sign up to set email alerts
|

A New Digital Image Steganography Approach Based on The Galois Field GF(pm) Using Graph and Auto

Abstract: In this paper, we introduce concepts of optimal and near optimal secret data hiding schemes. We present a new digital image steganography approach based on the Galois field () m GF p using graph and automata to design the data hiding scheme of the general form 2 (, , log) mn k N p     for binary, gray and palette images with the given assumptions, where , , , k m n N are positive integers and p is prime, show the sufficient conditions for the existence and prove the existence of some optimal and near optim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(9 citation statements)
references
References 19 publications
(74 reference statements)
0
9
0
Order By: Relevance
“…We organize the rest of this paper as follows. In Section 2, we recall some terminologies, definitions and results in [24,27,28,29]. Section 3 proposes algorithms used by users and servers in SSE, we first construct a novel cryptosystem based on the data hiding scheme in [27], apply this cryptosystem to the process of encrypting and decrypting a secret data sequence and some security analyses are also discussed in Subsection 3.1.…”
Section: Organizationmentioning
confidence: 99%
See 4 more Smart Citations
“…We organize the rest of this paper as follows. In Section 2, we recall some terminologies, definitions and results in [24,27,28,29]. Section 3 proposes algorithms used by users and servers in SSE, we first construct a novel cryptosystem based on the data hiding scheme in [27], apply this cryptosystem to the process of encrypting and decrypting a secret data sequence and some security analyses are also discussed in Subsection 3.1.…”
Section: Organizationmentioning
confidence: 99%
“…In Section 2, we recall some terminologies, definitions and results in [24,27,28,29]. Section 3 proposes algorithms used by users and servers in SSE, we first construct a novel cryptosystem based on the data hiding scheme in [27], apply this cryptosystem to the process of encrypting and decrypting a secret data sequence and some security analyses are also discussed in Subsection 3.1. We then use the automata approach in our previous researches [28,29] to design exact and approximate pattern matching algorithms on secrete data encrypted by our cryptosystem in Subsection 3.2.…”
Section: Organizationmentioning
confidence: 99%
See 3 more Smart Citations