2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013) 2013
DOI: 10.1109/iciip.2013.6707619
|View full text |Cite
|
Sign up to set email alerts
|

Secure key based image realization steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Steganography [23]: Instead of embedding the secret information directly into the cover image, image realization has been proposed in this paper. Embedding of some mapping information related to the secret information into the cover image is done using Matrix Encoding Technique and the realization of the secret is done using a highly secured pass key.…”
Section: Secure Key Based Image Realizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Steganography [23]: Instead of embedding the secret information directly into the cover image, image realization has been proposed in this paper. Embedding of some mapping information related to the secret information into the cover image is done using Matrix Encoding Technique and the realization of the secret is done using a highly secured pass key.…”
Section: Secure Key Based Image Realizationmentioning
confidence: 99%
“…Mapping of secret message, key generation and the embedding are done in the first phase followed by the extraction procedure in the next phase. One of the planes (red plane in [23]) of RGB image is used for creating the mapping matrix. The selected plane (C i ) is represented as the multiples of secret image and divided into different blocks.…”
Section: Secure Key Based Image Realizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The map can be extracted later on. An IRS scheme has been proposed in [12] where a simple arithmetic mapping between the cover and the secret images have been used for image realization.…”
Section: Introductionmentioning
confidence: 99%
“…As an alternative, a reversible reduction mapping capable of regenerating the payload in presence of a suitable decoding key can be considered to be a viable solution. Steganography techniques using map based realization are termed as Image Realization Steganography [11,12]. Parallel beam projection [13] of an image payload is observed to fulfill the requirements of such a mapping scheme.…”
Section: Introductionmentioning
confidence: 99%