2013
DOI: 10.1007/978-1-4614-6154-8_60
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Image Steganography Technique to Hide Multiple Secret Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…The authors in (Hemalatha et al, 2013) achieve an embedding capacity of 1.33 bpp while we achieve an embedding capacity of 4 bpp. When comparing the stegoimage and the corresponding cover image, (Hemalatha et al, 2013) achieve a PSNR value of 44.75 dB while we achieve a PSNR value of 39.83 dB. This is again considered acceptable because of the reason discussed above.…”
Section: Referencementioning
confidence: 84%
See 1 more Smart Citation
“…The authors in (Hemalatha et al, 2013) achieve an embedding capacity of 1.33 bpp while we achieve an embedding capacity of 4 bpp. When comparing the stegoimage and the corresponding cover image, (Hemalatha et al, 2013) achieve a PSNR value of 44.75 dB while we achieve a PSNR value of 39.83 dB. This is again considered acceptable because of the reason discussed above.…”
Section: Referencementioning
confidence: 84%
“…For the case of embedding two secret images in a cover image, we compare with (Hemalatha et al, 2013). Here, two grayscale images are embedded into a color cover image.…”
Section: Referencementioning
confidence: 99%
“…• LL sub band of Cb is used to hide one secret image and LL sub band of Cr is used to hide another secret image. Then the two keys K1 and K2 corresponding to two secret images are obtained using the same procedure used in our previous work [16] as described in section 2. • The two keys are then encrypted using simple exclusive or operation with a key and run length encoded and then hidden in the cover image using IWT as follows: o Find the integer wavelet transform of Cb component of the cover image.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The proposed work is the modification of our previous work [16] in which the secret images are transmitted without actually embedding in the cover image. Only the keys are hidden in the cover image.…”
Section: Related Workmentioning
confidence: 99%
“…In this method estimated hidden image is extracted which is not look like original hidden image. In [15] author presented a steganography approach based on DWT in which more than one secret image are embedded in one cover image. In [16], presented high capacity LSB based steganography utilizing distributed approach making stego-images stronger against several steganalysis attacks as decomposed secret information are equitably distributed among various cover images file making it harder to decide its reality, however this approach does not use appropriate scheme to reassemble circulated images.…”
Section: Related Workmentioning
confidence: 99%