2019
DOI: 10.35940/ijitee.i1127.0789s19
|View full text |Cite
|
Sign up to set email alerts
|

High Capacity Steganography Protected using Shamir’s Threshold Scheme and Permutation Framework

Abstract: This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir’s threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…The three basic ideas behind robust steganography are embedding capacity, invisibility and imperceptibility. There is a tradeoff among these features to obtain high-quality steganography [3][4][5][6].…”
Section: A Introduction Of Steganographymentioning
confidence: 99%
“…The three basic ideas behind robust steganography are embedding capacity, invisibility and imperceptibility. There is a tradeoff among these features to obtain high-quality steganography [3][4][5][6].…”
Section: A Introduction Of Steganographymentioning
confidence: 99%