2022
DOI: 10.21123/bsj.2022.19.1.0197
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

Abstract: Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Data is encrypted using the Advanced Encryption Standard (AES) cryptography, while the information is concealed using LSB steganography [13]. The resulting paradigm provides customers with a higher sense of security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Data is encrypted using the Advanced Encryption Standard (AES) cryptography, while the information is concealed using LSB steganography [13]. The resulting paradigm provides customers with a higher sense of security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The EC value ranges between the original image and stego image, and the highest value (0.049476076) and lowest value (0.000120296) were confirmed excellent, given the characteristics of the photos. Figure (11) explains the curve of the ratios of the entropy and EC of the 10 tested images.…”
Section: Ec= N/(h*w) Bpp ……………(4)mentioning
confidence: 99%
“…application of unified security to all image formats, the ability to select the cover images that are most appropriate for the length of the data and network bandwidth. The results of this method are very effective and efficient Yasir Ahmed Hamza, Nada Elya Tewfiq, and Mohammed Qasim Ahmed [11], along with visual coding, suggested improving image masks. Images were captured with a size of 128x128.…”
mentioning
confidence: 94%
“…Hamza et al [13] proposed a new way to hide an encrypted binary logo image by generating two secret shares. The RGB cover image (512×512) is divided into three red, green, and blue bands during the data embedding process.…”
Section: Related Workmentioning
confidence: 99%