2021
DOI: 10.1007/978-981-15-9647-6_93
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Image Security Using Stenography and Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…The parities of these intermediate values are (odd, odd), (even, even), (odd, even), and (even, odd). As illustrated in Figure A2, values in C (1) and C (2) are always (odd, odd) and (even, even), respectively. The missing values can be (odd, even) or (even, odd).…”
Section: The Proposed Universal Algorithm For Ecsm and Ecdsmmentioning
confidence: 96%
See 2 more Smart Citations
“…The parities of these intermediate values are (odd, odd), (even, even), (odd, even), and (even, odd). As illustrated in Figure A2, values in C (1) and C (2) are always (odd, odd) and (even, even), respectively. The missing values can be (odd, even) or (even, odd).…”
Section: The Proposed Universal Algorithm For Ecsm and Ecdsmmentioning
confidence: 96%
“…The proposed flag signal generation algorithm is shown in Algorithm 4. In this algorithm, A i and B i denote the values of m and n, respectively, in Equation (2). The difference between C…”
Section: The Proposed Universal Algorithm For Ecsm and Ecdsmmentioning
confidence: 99%
See 1 more Smart Citation
“…In [37], additional security is provided by using a two-layer defense system that combines encryption and information hiding. The PSNR and MSE parameters are used to gauge the security level of the hidden image.…”
Section: Literature Reviewmentioning
confidence: 99%
“…With the rapid development of image processing technology comes the growing need for the enhanced safety of image storage [1][2][3][4], especially in sensitive applications such as face recognition payment, ID verification, license plate recognition, satellite radar imaging and secret military image storage, electronic backup of confidential documents, etc. Cryptographic algorithms are often used in these applications as security assurance.…”
Section: Introduction 1research Backgroundmentioning
confidence: 99%