Image steganography conceals secret information in a cover image.It is used for secure data transfer. Various LSB (least significant bits) approaches have been used over the years in steganography. This paper proposes a novel technique to improve the conventional LSB technique for image steganography by using pseudo random number generation using Hénon chaotic map. The random numbers are used to encrypt the hide image which is embedded in the cover picture. This encryption using pseudo random generator provides sufficient security to the payload as the same set of random numbers cannot be regenerated without knowing the exact random generator function and thus the secret data cannot be retrieved easily. The proposed technique has been test...
Steganography is the efficient technique to provide secure data transmission over the network, as th...
Nowadays, digital communication has become an essential part of infrastructure, a lot of application...
The exchange of data is not limited to personal text information or information about institutions a...
Image steganography is a technique to hide secret information in an image without leaving any appare...
There have been many techniques for hiding messages in images in such a manner that the alterations ...
When it comes to information hiding it is always a question whether to use Steganography or cryptogr...
Abstract Many methods of hiding information in an image are existing now. The least significant bit ...
International audienceRecently, Steganography is widely used for communicating data secretly. It can...
Cryptography and steganography are among the most important sciences that have been properly used to...
Information hiding is a technique that embeds secret information into digital contents such as image...
Information Hiding is a task that face difficult challenges in current time. The reason for these ch...
The art of information hiding has been around nearly as long as the need for covert communication. S...
In steganography, secret data are invisible in cover media, such as text, audio, video and image. He...
This paper, presents a novel chaos-based image steganography algorithm. Because of efficient propert...
Steganography is derived from the Greek word steganographic which means covered writing. It is the s...
Steganography is the efficient technique to provide secure data transmission over the network, as th...
Nowadays, digital communication has become an essential part of infrastructure, a lot of application...
The exchange of data is not limited to personal text information or information about institutions a...
Image steganography is a technique to hide secret information in an image without leaving any appare...
There have been many techniques for hiding messages in images in such a manner that the alterations ...
When it comes to information hiding it is always a question whether to use Steganography or cryptogr...
Abstract Many methods of hiding information in an image are existing now. The least significant bit ...
International audienceRecently, Steganography is widely used for communicating data secretly. It can...
Cryptography and steganography are among the most important sciences that have been properly used to...
Information hiding is a technique that embeds secret information into digital contents such as image...
Information Hiding is a task that face difficult challenges in current time. The reason for these ch...
The art of information hiding has been around nearly as long as the need for covert communication. S...
In steganography, secret data are invisible in cover media, such as text, audio, video and image. He...
This paper, presents a novel chaos-based image steganography algorithm. Because of efficient propert...
Steganography is derived from the Greek word steganographic which means covered writing. It is the s...
Steganography is the efficient technique to provide secure data transmission over the network, as th...
Nowadays, digital communication has become an essential part of infrastructure, a lot of application...
The exchange of data is not limited to personal text information or information about institutions a...