2021
DOI: 10.1109/access.2021.3133672
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Flipping Technique to Reduce Variability in Image Steganography

Abstract: Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…Table 3 showing the PSNR and CC results demonstrates that the proposed approach can extract the hidden image with little to no noise. This can be observed by lower PSNR and CC values in contrast with other systems [3,39]. In Table 4, the NPCR and UACI results of the proposed approach are compared with those of previous schemes [21,36,40].…”
Section: Comparative Analysismentioning
confidence: 97%
See 2 more Smart Citations
“…Table 3 showing the PSNR and CC results demonstrates that the proposed approach can extract the hidden image with little to no noise. This can be observed by lower PSNR and CC values in contrast with other systems [3,39]. In Table 4, the NPCR and UACI results of the proposed approach are compared with those of previous schemes [21,36,40].…”
Section: Comparative Analysismentioning
confidence: 97%
“…During the first phase, a combination of Boolean matrices, ShareR1, ShareG1, ShareB1 and ShareR2, ShareG2, and ShareB2, for each color channel is produced. Having the same proportions between each share and the hidden image, each share's pixel is calculated based on the probability of color levels determined by a probability solution in HHO [3]. As shown in Figure 5, the encrypted images look like disordered images.…”
Section: Generating Sharementioning
confidence: 99%
See 1 more Smart Citation
“…Data is secured through two methods, which are encryption techniques or data hiding techniques. There are many research papers that focus on data hiding techniques, such as [22][23][24][25][26]. In this research paper, we will also concentrate on data hiding techniques.…”
Section: Data Hiding Techniquesmentioning
confidence: 99%
“…Data is secured through two methods, which are encryption techniques or data hiding techniques. There are many research papers that focus on data hiding techniques, such as [22][23][24][25][26]. In this research paper, we will also concentrate on data hiding techniques.…”
Section: Data Hiding Techniquesmentioning
confidence: 99%