scholar.google.com › citations
Based on the summarization of modern cryptographic theory, this paper uses the achievements of chaos to analyze the theory and techniques of information hiding.
An algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
This paper implements the steganography in frequency domain. A DCT transformation technique is used to convert the cover image from spatial to frequency domain.
People also ask
What method is used for hiding information?
Which cryptographic techniques is used to hide information inside other media?
What is information hiding in cyber security?
Dec 20, 2017 · This paper proposes a data hiding method using the Discrete Cosine Transform (DCT) algorithm to store network authentication information into ...
In this paper, we propose a steganographic scheme based on the varieties of coefficients of discrete cosine transformation of an image.
Mar 30, 2021 · This paper uses a Discrete Cosine Transform (DCT) to hide text message in the image. The method hide information in the transformed coefficient ...
In this paper, we have proposed an efficient image steganography algorithm to embed the secret image in the cover image.
Dec 30, 2021 · In this method, several candidate blocks were segmented from source texture images, and then the candidate blocks were divided into core regions ...
May 12, 2020 · This paper proposes an improved image steganography technique in which data is embedded in the edge pixels of the carrier image.
This paper proposed a combination of steganography and cryptography by using Discrete Cosine Transform (DCT), One Time Pad (OTP) and PN-Sequence implemented ...