Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2012
DOI: 10.1007/978-3-642-30111-7_21
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Yang et al in 2006 gave a digital image scrambling technology based on the symmetry of AT [7]. Minati Mishra et al in their papers further extended the method and generalised the AT to improve the security of the scrambled information [8], [9]. When a group of people were concentrating on AT, at the same time, Qi et al in 2000 gave a new class of transform and its application in the image transform covering [10] which is further extended by Zou et al ,who have used Fibonacci numbers and generalised Fibonacci transform to scramble image in spatial domain [11], [12].…”
Section: Image Scramblersmentioning
confidence: 99%
See 1 more Smart Citation
“…Yang et al in 2006 gave a digital image scrambling technology based on the symmetry of AT [7]. Minati Mishra et al in their papers further extended the method and generalised the AT to improve the security of the scrambled information [8], [9]. When a group of people were concentrating on AT, at the same time, Qi et al in 2000 gave a new class of transform and its application in the image transform covering [10] which is further extended by Zou et al ,who have used Fibonacci numbers and generalised Fibonacci transform to scramble image in spatial domain [11], [12].…”
Section: Image Scramblersmentioning
confidence: 99%
“…The security level of the encrypted text becomes low when it is encrypted using the basic Arnold transform as it constitutes a single 2x2 map and therefore, can easily be decrypted by any 3 rd party user, using the same map. To enhance the security level of the encrypted message the basic AT is generalised [8], [9] as follows:…”
Section: Modified Arnold Transformmentioning
confidence: 99%
“…Xiao et al (2000) present a novel way to hide information with the aid of visual cryptography. They concealed a secret message using two innocent looking images [9], [10]. Once the two images were superimposed the secret text was revealed.…”
Section: A Visual Cryptographymentioning
confidence: 99%
“…One such class is known as the quadratic maps [2]. In addition, these quadratic maps can be transformed or rotated using matrices such as Arnold's map which transform image pixels or bring about rotations [12,20]. These maps can be used to encrypt and decrypt images or other media.…”
Section: Introductionmentioning
confidence: 99%