Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems 2011
DOI: 10.1109/idaacs.2011.6072859
|View full text |Cite
|
Sign up to set email alerts
|

Biometric logical access control enhanced by use of steganography over secured transmission channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Deliberate alteration of the LSB, or indeed the last two binary digits, can be used to embed secret information into that pixel without the change being detectable to the human eye viewing the image [51].…”
Section: Least Significant Bit (Lsb) Embeddingmentioning
confidence: 99%
“…Deliberate alteration of the LSB, or indeed the last two binary digits, can be used to embed secret information into that pixel without the change being detectable to the human eye viewing the image [51].…”
Section: Least Significant Bit (Lsb) Embeddingmentioning
confidence: 99%
“…Confidentiality can be provided by the use of steganography as well as cryptography. Steganography allows to hide data in such a way that their presence cannot be detected by humans [6]. Unlike steganography, cryptography transforms the output in such a way that its content is not hidden [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…4. The next pixels are read to come across another RGB component value of 3, and as in step 2, the next every two values marked as a i and b i are used to compute t i values with (6). The resulting string is the name and extension of the text file.…”
mentioning
confidence: 99%