2013 3rd IEEE International Advance Computing Conference (IACC) 2013
DOI: 10.1109/iadcc.2013.6514379
|View full text |Cite
|
Sign up to set email alerts
|

Security improvisation in image steganography using DES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…[8] proposed simple DCT method to insert confidential data into zero coefficients in a zigzag sequence of 8×8 DCT blocks. Work in [17] proposes a method which use bitplane encoding procedure multiple times and redundancy evaluation approach to increase hiding capacity. The work proposed in [11] is based on Integer Wavelet Transform (IWT).…”
Section: A Jpeg Steganography -Frequency Domainmentioning
confidence: 99%
“…[8] proposed simple DCT method to insert confidential data into zero coefficients in a zigzag sequence of 8×8 DCT blocks. Work in [17] proposes a method which use bitplane encoding procedure multiple times and redundancy evaluation approach to increase hiding capacity. The work proposed in [11] is based on Integer Wavelet Transform (IWT).…”
Section: A Jpeg Steganography -Frequency Domainmentioning
confidence: 99%
“…The advancement of information and communication technologies in recent ages has made the delivery of digital information further relevant. It is necessary for various divisions, for instance, government, education, banking, and healthcare, where the Internet has to turn out to be the bedrock for data exchange and distribution [1][2][3][4][5]. The medical industries mainly use the internet to promote remote sharing between hospitals and clinics of digital medical information and to provide patients with e-health facilities [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…In order to protect messages when it sent, the message must be secure from the irresponsible parties. In another case, Security Improvisation in Image Steganography using DES, the research talk about protect the confidentiality and integrity of data against unauthorized access, cryptographic techniques are needed to hide secret messages that are masked secret information within other information or named steganography [7]. Another implementation of DES is SSTL Based Power Efficient on 28nm FPGA [6].…”
Section: Introductionmentioning
confidence: 99%