The main objective of this study is to form a unique and economical steganographic technique for digital pictures employed for secret transmission using texture and fuzzy logic. This technique is employed to embed data in the carrier image and to extract the hidden message within the same carrier image. Initially, fuzzification is completed which transforms the carrier and the secret image into numerous bitplanes. Afterward, the pixel number calculation is completed within the original image. Then feature extraction is completed within the secret image so as to represent the data in it. Finally, pixel merging follows within the sender region by assignment of white and black pixels in the original image and in the secret pictures. Pixel numb...
The research work in this paper shows that the currently available stenographic methods might be qui...
This paper presents a new security system by combining cryptographic and steganographic Technique. T...
The proposed system makes use of steganographic method along with visual cryptography for hiding dat...
The main objective of this study is to form a unique and economical steganographic technique for dig...
AbstractIn recent years, image steganography has been one of the emerging research areas. As the fie...
Steganography is the idea of hiding private, sensitive data or information within something that app...
Transform-based techniques partially address challenges like robustness and the imperceptibility in ...
AbstractIn this fast world of networking, secure image transmission of data whether the image having...
The evolution in communication techniques has created wide threats for crucial information transfer ...
Information security is one of the most significant processes that must be taken into account when c...
[[abstract]]A new and efficient steganographic method for embedding secret messages into a gray-valu...
Embedding a message in media files, also known as steganography, is a common approach to hide secret...
Internet world is characterized by many users among which are crackers and thieves. Hence, the need ...
One of the unexpected intelligence tactics known in World War II was to conceal the data in images t...
Part 10: Image UnderstandingInternational audienceIn order to improve the performance of coverless s...
The research work in this paper shows that the currently available stenographic methods might be qui...
This paper presents a new security system by combining cryptographic and steganographic Technique. T...
The proposed system makes use of steganographic method along with visual cryptography for hiding dat...
The main objective of this study is to form a unique and economical steganographic technique for dig...
AbstractIn recent years, image steganography has been one of the emerging research areas. As the fie...
Steganography is the idea of hiding private, sensitive data or information within something that app...
Transform-based techniques partially address challenges like robustness and the imperceptibility in ...
AbstractIn this fast world of networking, secure image transmission of data whether the image having...
The evolution in communication techniques has created wide threats for crucial information transfer ...
Information security is one of the most significant processes that must be taken into account when c...
[[abstract]]A new and efficient steganographic method for embedding secret messages into a gray-valu...
Embedding a message in media files, also known as steganography, is a common approach to hide secret...
Internet world is characterized by many users among which are crackers and thieves. Hence, the need ...
One of the unexpected intelligence tactics known in World War II was to conceal the data in images t...
Part 10: Image UnderstandingInternational audienceIn order to improve the performance of coverless s...
The research work in this paper shows that the currently available stenographic methods might be qui...
This paper presents a new security system by combining cryptographic and steganographic Technique. T...
The proposed system makes use of steganographic method along with visual cryptography for hiding dat...