2019
DOI: 10.4018/978-1-5225-7492-7.ch026
|View full text |Cite
|
Sign up to set email alerts
|

Steganography Using Biometrics

Abstract: In this smart age, smart gadgets with internet connectivity have become a necessity. While enjoying these facilities, one must count the security of their private or confidential information. With due time, a lot of cryptographic methods have been developed for enforcing security. On the other hand, with the advancement of technologies, the intruders and hackers have also developed their skills and tools. Therefore, many times we fail to protect our information. To get rid of this situation, the developers hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 28 publications
0
0
0
Order By: Relevance
“…Stego-image is the output of the embedding process. Stego-image contain the hidden message either in pixel values or in optimally selected coefficients[11] Fig. 6.…”
mentioning
confidence: 99%
“…Stego-image is the output of the embedding process. Stego-image contain the hidden message either in pixel values or in optimally selected coefficients[11] Fig. 6.…”
mentioning
confidence: 99%