scispace - formally typeset
Open AccessJournal ArticleDOI

Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover

Reads0
Chats0
TLDR
A robust and blind color image steganography algorithm, using fractal cover images, Singular Value Decomposition (SVD), Integer Wavelet Transform (IWT), and Discrete Wavelet transform (DWT) to hide the presence of secret information, is proposed in this paper.
About
This article is published in Journal of King Saud University - Computer and Information Sciences.The article was published on 2020-10-17 and is currently open access. It has received 11 citations till now. The article focuses on the topics: Singular value decomposition & Fractal compression.

read more

Citations
More filters
Journal ArticleDOI

Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

TL;DR: In this paper , the authors classify image steganography research based on its goals and its assessment tools, and review the use of assessment tools in depth because it is closely related to the goal of steganographic research, including challenges or issues, methods, developments, and popular datasets.
Book ChapterDOI

Securing the COVID Patients’ Medical Records Using Encrypted Image Steganography

TL;DR: In this paper , the authors discuss a novel image steganography method that can withstand either statistical tool-based or machine learning (ML)-based steganalysis attacks to ensure secure transmission of the medical images like chest X-rays, CT or MRI reports to the medical experts or hospitals for early diagnosis and fast recovery of the infected persons.
Proceedings ArticleDOI

Comparative Analysis of Chaotic Image Encryption Using Improved 2D Gingerbreadman Map and Chirikov Standard Map

TL;DR: In this article , a comparative analysis of image encryption algorithms based on a novel 2D Gingerbreadman map and chaotic Chirikov Standard map is presented, where the Pseudo Random Bit Generators are constructed from novel models of 2D gingerbreadman maps and chaotic chaotic map.
References
More filters
Journal ArticleDOI

Review: Digital image steganography: Survey and analysis of current methods

TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI

On the limits of steganography

TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Journal ArticleDOI

Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring

TL;DR: This paper presents a HealthIIoT-enabled monitoring framework, where ECG and other healthcare data are collected by mobile devices and sensors and securely sent to the cloud for seamless access by healthcare professionals.
Journal ArticleDOI

Image steganography in spatial domain: A survey

TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Book ChapterDOI

Chaos and Fractals

TL;DR: A survey of the mathematical work done in our laboratory in the past 10 years can be found in this paper, where the authors present a survey of mathematical work in the field of computer science.
Related Papers (5)