2010
DOI: 10.5120/730-1023
|View full text |Cite
|
Sign up to set email alerts
|

Info Hide – A Cluster Cover Approach

Abstract: In a highly digitalized world we live today, the data to be transmitted are confidential at times, and in such cases there are many malicious intruders who try to access this information. Steganography is one recent method to provide reliable security. Steganography is the science of embedding data into different covers such that the data embedded is imperceptible; the aim is to embed and deliver secret messages in digital objects without suspicion. The covers that can be used cover all forms of digital multim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 17 publications
(12 reference statements)
0
10
0
Order By: Relevance
“…This towering need for maintaining secrecy of critical information has given rise to several subclasses of information hiding techniques namely steganography, cryptography and watermarking techniques. Steganography is the art of camouflaging the vital information in a cover object in such a way that its very existence is concealed where the cover object may be Audio, Video or An Image [7,8,11]. In cryptography [10], although the presence of information is conspicuous the code is indecipherable as it is sent in an inscrutable format.…”
Section: Introductionmentioning
confidence: 99%
“…This towering need for maintaining secrecy of critical information has given rise to several subclasses of information hiding techniques namely steganography, cryptography and watermarking techniques. Steganography is the art of camouflaging the vital information in a cover object in such a way that its very existence is concealed where the cover object may be Audio, Video or An Image [7,8,11]. In cryptography [10], although the presence of information is conspicuous the code is indecipherable as it is sent in an inscrutable format.…”
Section: Introductionmentioning
confidence: 99%
“…Steganography and cryptography are both ways to protect information from unwanted parties but neither technology alone is perfect and can be compromised. Steganography is implemented [7,9,13,14,15] in digital audio, video and images of which image steganography has gained much impetus and reputation in the recent past. In image steganography the critical data is camouflaged in a cover image with immense dexterity resulting in the stego image.…”
Section: Introductionmentioning
confidence: 99%
“…Traditionally information hiding schemes embed data into image, audio, video etc [1,2,3]. These kinds of schemes are called water marking.…”
Section: Introductionmentioning
confidence: 99%
“…This is used for the purpose of copyright protection, authentication and authorized access control [3]. Water marking schemes [3] have been proposed in spatial [1,2,3] and spectral domain [3]. Spatial domain based texture characteristic methods are easily implemented but have worse performance than the spectral domain based methods, that usually embed into the DCT and DWT [5] coefficients.…”
Section: Introductionmentioning
confidence: 99%