2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) 2011
DOI: 10.1109/etncc.2011.5958477
|View full text |Cite
|
Sign up to set email alerts
|

Data hiding in color image using cryptography with help of ASK algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The length of the key is at user' s choice and it could be as long as the message length or may be limited by cover image size. Our technique does not require any preprocessing on cover image before hiding the data unlike in [4].…”
Section: Introductionmentioning
confidence: 94%
“…The length of the key is at user' s choice and it could be as long as the message length or may be limited by cover image size. Our technique does not require any preprocessing on cover image before hiding the data unlike in [4].…”
Section: Introductionmentioning
confidence: 94%
“…This produced sequence of modifications in cover image is added in the stego image. To match the secret message in the stego object, the produced sequence of modification is used for transmitting the data [10]. The encoding of the data or message is done at the pseudorandomly chosen pixels.…”
Section: Distortion Techniquementioning
confidence: 99%