2017
DOI: 10.1007/978-981-10-3935-5_36
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…From the table, we can see that the PSNR values obtained by our technique are almost half of that obtained by the author Vijay through his proposed technique [10]. Furthermore, the MSE value obtained is extremely less that author Vijay's obtained value.…”
Section: Resultsmentioning
confidence: 52%
“…From the table, we can see that the PSNR values obtained by our technique are almost half of that obtained by the author Vijay through his proposed technique [10]. Furthermore, the MSE value obtained is extremely less that author Vijay's obtained value.…”
Section: Resultsmentioning
confidence: 52%
“…DCTs are essential and crucial for various applications in the field of medical science/engineering. In lossy compression of audio files, such as MP3, and images, such as JPEG, the small high-frequency elements may be discarded, and DCT is suitable [ 43 , 44 , 45 , 46 ].…”
Section: Methodsmentioning
confidence: 99%
“…On the other hand, some other researchers used both techniques, but they just used one level of cryptography or steganography, and this sort of security level is not enough, as it can be found easily by people. The authors of the paper [19], try to Combine cryptography and steganography, which has resulted in the creation of a new mechanism. The 2-dimensional haar discrete wavelet transform (2-D HDWT) was used on the cover image to extract its coefficient characteristics, and the advanced encryption standard (AES) method was applied to the secret images to encode them before hiding them in the cover image.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 4. Hidding process for the proposed steganography techniques [19] Figure 5. Revealing the process for the proposed method [19] The proposed work paper [20] uses a technique to enhance the AES algorithm, which is used to encrypt plaintext, and it used the elliptical curve cryptography (ECC) algorithm, which is then used to encrypt the AES key.…”
Section: Related Workmentioning
confidence: 99%