2018
DOI: 10.14569/ijacsa.2018.090323
|View full text |Cite
|
Sign up to set email alerts
|

Computerized Steganographic Technique using Fuzzy Logic

Abstract: Steganography is the method of providing Computer security in which hiding the required information is done by inserting messages within other messages, which is a string of characters containing the useful information, in a carrier image. Using this technique, the required information from the secret image is embedded into individual rows as well as columns present in the pixels of carrier image. In this paper, a novel fuzzy logic based technique is proposed to hide the secret message in individual rows and i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 14 publications
(13 reference statements)
0
1
0
Order By: Relevance
“…LSB steganography substitution is used for embedding and obtained high imperceptibility. Acceleration of LSB Algorithm in GPU [3] presents a method for accelerating the steganography using Computer Unified Device Architecture (CUDA) by parallelizing the computations to a single pixel with a hybrid of message passing [7] and shared memory thereby reducing the runtime of the program. Authors in [4] Proposes the secret data is encrypted using fuzzy technique to increase the hidden robustness.…”
Section: Introductionmentioning
confidence: 99%
“…LSB steganography substitution is used for embedding and obtained high imperceptibility. Acceleration of LSB Algorithm in GPU [3] presents a method for accelerating the steganography using Computer Unified Device Architecture (CUDA) by parallelizing the computations to a single pixel with a hybrid of message passing [7] and shared memory thereby reducing the runtime of the program. Authors in [4] Proposes the secret data is encrypted using fuzzy technique to increase the hidden robustness.…”
Section: Introductionmentioning
confidence: 99%