2018 6th International Symposium on Digital Forensic and Security (ISDFS) 2018
DOI: 10.1109/isdfs.2018.8355320
|View full text |Cite
|
Sign up to set email alerts
|

A novel secure model: Image steganography with logistic map and secret key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 17 publications
0
4
0
1
Order By: Relevance
“…In order to effectively evaluate the quality of stego-images, various evaluation metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Normalized Cross Correlation (NCC), and Structural Similarity Index (SSIM) are used [97], [98]. Many image qualities of assessment metrics are used for encrypted image and any one can be utilize for measurement of the image.…”
Section: B Some Quality Assessment Metrics Analysis For Stego Imagementioning
confidence: 99%
“…In order to effectively evaluate the quality of stego-images, various evaluation metrics such as Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Normalized Cross Correlation (NCC), and Structural Similarity Index (SSIM) are used [97], [98]. Many image qualities of assessment metrics are used for encrypted image and any one can be utilize for measurement of the image.…”
Section: B Some Quality Assessment Metrics Analysis For Stego Imagementioning
confidence: 99%
“…The steganography consists of several basic components, which are considered essential components, starting with the original image before embedding it, which is called the cover image, and the text to be included within the image is called the secret message, which is supposed to be transferred to the binary system [12]. The embedding process, which reflects the proposed method, is stored in the key called the stego key.…”
Section: Steganographymentioning
confidence: 99%
“…Karakteristik chaos adalah sensitivitas terhadap kondisi awal, berkelakuan acak, dan tidak memiliki periode berulang.Logistic map merupakan salah satu fungsi chaos yang banyak digunakan dalam teknik penyisipan data karena sederhana dan sangat cepat tetapi fungsi ini sendiri memiliki ruang kunci yang kecil [5]. Permasalahan ruang kunci merupakan faktor penting dalam metode keamanan [6]. Untuk meningkatkan keamanan, dilakukan sebuah modifikasi pada logistic map untuk meningkatkan ruang kunci dengan menambahkan tiga variabel baru berupa , ,dan sebagai parameter baru.…”
Section: Pendahuluanunclassified