International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014) 2014
DOI: 10.1109/icraie.2014.6909252
|View full text |Cite
|
Sign up to set email alerts
|

Secret communication using Public Key steganography

Abstract: This paper introduces a new steganographic technique for secret data communication based on Public Key Digital Image steganography by combining public key cryptography with Digital Image Steganography. The proposed scheme employs RSA algorithm with 1024 bits key size for secret data encryption before inserting it into cover image and F5 steganographic technique to hide the encrypted message inside the cover image imperceptibly. The F5 algorithm embeds the message into randomly chosen Discrete Courier Transform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 7 publications
0
6
0
1
Order By: Relevance
“…In [29], authors proposed new strategy employs RSA algorithm with 128-byte key size for encrypting the secret information before embedded it into a cover image and use F5 steganographic algorithm to embed the encrypted message in the cover image gradually. they selected chosen Discrete Courier Transform (DCT) coefficients randomly to embed the secret message into it by using F5 algorithm.…”
Section: O P Y R I G H T © S O C I E T Y F O R S C I E N C E a N D mentioning
confidence: 99%
“…In [29], authors proposed new strategy employs RSA algorithm with 128-byte key size for encrypting the secret information before embedded it into a cover image and use F5 steganographic algorithm to embed the encrypted message in the cover image gradually. they selected chosen Discrete Courier Transform (DCT) coefficients randomly to embed the secret message into it by using F5 algorithm.…”
Section: O P Y R I G H T © S O C I E T Y F O R S C I E N C E a N D mentioning
confidence: 99%
“…Also according to some it is not completely safe. In another existing paper the secret information is fabricated into a binary image to convert it to a gray scale image [14][15][16].…”
Section: Related Workmentioning
confidence: 99%
“…A supposition may be completed based on this typical when both the sender and receiver will share particular public secret data then the conforming steganography procedure is recognized as then the secret key steganography where as pure steganography proceeds that there is nothing previous data mutual by sender and receiver. While the public key of the receiver is identified to the sender, the steganographic procedure is named public key steganography [10].…”
Section: Introductionmentioning
confidence: 99%