2024
DOI: 10.11591/eei.v13i3.7140
|View full text |Cite
|
Sign up to set email alerts
|

Secure map-based crypto-stego technique based on mac address

Dima S. Kasasbeh,
Bushra M. Al-Ja’afreh,
Mohammed Anbar
et al.

Abstract: Steganography and cryptography are spy craft cousins, working differently to achieve the same target. Cryptography is perceptible and observable without understanding the real content, while steganography hides the content so that it is not perceptible or observable and without producing noticeable changes to the carrier image. The challenge is finding the right balance between security and retrievability of embedded data from embedding locations without increasing the required embedded information. This paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 22 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?