Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover
Asha Durafe,Vinod Patidar +1 more
Reads0
Chats0
TLDR
A robust and blind color image steganography algorithm, using fractal cover images, Singular Value Decomposition (SVD), Integer Wavelet Transform (IWT), and Discrete Wavelet transform (DWT) to hide the presence of secret information, is proposed in this paper.About:
This article is published in Journal of King Saud University - Computer and Information Sciences.The article was published on 2020-10-17 and is currently open access. It has received 11 citations till now. The article focuses on the topics: Singular value decomposition & Fractal compression.read more
Citations
More filters
Journal ArticleDOI
Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
TL;DR: In this paper , the authors classify image steganography research based on its goals and its assessment tools, and review the use of assessment tools in depth because it is closely related to the goal of steganographic research, including challenges or issues, methods, developments, and popular datasets.
Journal ArticleDOI
Optimized visually meaningful image embedding strategy based on compressive sensing and 2D DWT-SVD
Journal ArticleDOI
Image Steganography Using Fractal Cover and Combined Chaos-DNA Based Encryption
Asha Durafe,Vinod Kumar Patidar +1 more
Book ChapterDOI
Securing the COVID Patients’ Medical Records Using Encrypted Image Steganography
Asha Durafe,Vinod Kumar Patidar +1 more
TL;DR: In this paper , the authors discuss a novel image steganography method that can withstand either statistical tool-based or machine learning (ML)-based steganalysis attacks to ensure secure transmission of the medical images like chest X-rays, CT or MRI reports to the medical experts or hospitals for early diagnosis and fast recovery of the infected persons.
Proceedings ArticleDOI
Comparative Analysis of Chaotic Image Encryption Using Improved 2D Gingerbreadman Map and Chirikov Standard Map
TL;DR: In this article , a comparative analysis of image encryption algorithms based on a novel 2D Gingerbreadman map and chaotic Chirikov Standard map is presented, where the Pseudo Random Bit Generators are constructed from novel models of 2D gingerbreadman maps and chaotic chaotic map.
References
More filters
Journal ArticleDOI
Review: Digital image steganography: Survey and analysis of current methods
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI
On the limits of steganography
TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Journal ArticleDOI
Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring
TL;DR: This paper presents a HealthIIoT-enabled monitoring framework, where ECG and other healthcare data are collected by mobile devices and sensors and securely sent to the cloud for seamless access by healthcare professionals.
Journal ArticleDOI
Image steganography in spatial domain: A survey
Mehdi Hussain,Mehdi Hussain,Ainuddin Wahid Abdul Wahab,Yamani Idna Bin Idris,Anthony T. S. Ho,Anthony T. S. Ho,Anthony T. S. Ho,Ki-Hyun Jung +7 more
TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Book ChapterDOI
Chaos and Fractals
TL;DR: A survey of the mathematical work done in our laboratory in the past 10 years can be found in this paper, where the authors present a survey of mathematical work in the field of computer science.