Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies 2016
DOI: 10.1145/2905055.2905249
|View full text |Cite
|
Sign up to set email alerts
|

An Elucidation on Steganography and Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The data extraction process essentially converts the cipher text into the plain text by using a secret key. As an example, [9] mapped the pixels into an image, which is a type of extraction method. The requirements for data extraction in watermarking method include the watermarked image and the secret key.…”
Section: Figure 1 Data Hiding Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…The data extraction process essentially converts the cipher text into the plain text by using a secret key. As an example, [9] mapped the pixels into an image, which is a type of extraction method. The requirements for data extraction in watermarking method include the watermarked image and the secret key.…”
Section: Figure 1 Data Hiding Frameworkmentioning
confidence: 99%
“…There are various type of extraction performance criteria frequently used in data hiding. Security [9], [11]- [19] S Imperceptibility [11], [20] IM Capacity [11]- [13][21]- [23] C Robust [9], [19], [24] R Efficiency [16], [18], [25] E Invisibility [26] IN Accuracy [27], [28] AC Speed [15] SP Complexity [21] CP Reversibility [25], [29] RV Realitibility RL Integrity [24], [30] IG Perceptibility [11] PC Assumption [24] AS Confidentiality [31] CF Availability [32] V…”
Section: Review Criteriamentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, steganography is a technique that hides a secret message in an ordinary message sent to the recipient. Hence, it prevents the original message from being intercepted by the unauthorized person which provides a safe exchange of information [12]. The remainder of the paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%