Proceedings ArticleDOI
Secret Sharing Using 3 Level DWT Method of Image Steganography Based on Lorenz Chaotic Encryption and Visual Cryptography
Barnali Gupta Banik,Samir Kumar Bandyopadhyay +1 more
- pp 1147-1152
Reads0
Chats0
TLDR
A new technique of Image Steganography has been proposed which is using Lorenz Chaotic Encryption to encrypt the secret message, 3 level Discrete Wavelet Transform to hide encrypted data and visual cryptography to share stego image in secret communication.Abstract:
Steganography is a traditional technique of covert communication. It is also best way to conceal secret data without revealing its existence to the outsider. In this paper a new technique of Image Steganography has been proposed which is using Lorenz Chaotic Encryption to encrypt the secret message, 3 level Discrete Wavelet Transform to hide encrypted data and visual cryptography to share stego image in secret communication.read more
Citations
More filters
Journal ArticleDOI
Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique
TL;DR: From the analysis, it shows that the proposed wavelet-based secret image sharing scheme with encrypted shadow images using optimal Homomorphic Encryption (HE) technique provide greater security compared to other existing schemes.
Journal ArticleDOI
Secure grayscale image communication using significant visual cryptography scheme in real time applications
G. Selva Mary,S. Manoj Kumar +1 more
TL;DR: The performance analysis proves that (k, n) SVC improves the quality of the reconstructed secret image with increased Peak Signal-to-Noise Ratio (PSNR) up to 21% and Pixel error is calculated as Mean Square Error (MSE) and it is reduced up to 77%.
Proceedings ArticleDOI
Puzzle based highly secure steganography
TL;DR: The outcome indicate that the recommended approach provides high steganographic security while providing high embedding capacity of about 5 bits per pixel.
Journal ArticleDOI
Accurate Device-Free Tracking Using Inexpensive RFIDs.
TL;DR: RDTrack is effective in tracking the moving target, with a low tracking error of 32 cm, and its accuracy is robust for different environments, highlighting RDTrack’s ability to enable future essential device-free moving-based interaction with RFID devices.
Dissertation
Cryptography and computer communications security : extending the human security perimeter through a web of trust
TL;DR: The author states that the aim of this book is to contribute towards the humanizing of mathematics and its application in the field of education.
References
More filters
Book
A wavelet tour of signal processing
TL;DR: An introduction to a Transient World and an Approximation Tour of Wavelet Packet and Local Cosine Bases.
Journal ArticleDOI
Deterministic nonperiodic flow
TL;DR: In this paper, it was shown that nonperiodic solutions are ordinarily unstable with respect to small modifications, so that slightly differing initial states can evolve into considerably different states, and systems with bounded solutions are shown to possess bounded numerical solutions.
Journal ArticleDOI
Zur Theorie der orthogonalen Funktionensysteme
TL;DR: In der Theorie der Reihenentwicklung der reellen Funktionen spielen die sog. orthogonalen Funktionensysteme eine fuhrende Rolle.
Reference BookDOI
A Primer on Wavelets and Their Scientific Applications
TL;DR: Haar WaveletsThe Haar TransformConservation and Compaction of EnergyRemoving Noise from Audio SignalsHaarWaveletsMultiresolution AnalysisCompression of audio SignalsRemoving noise from AudiosignalsNotes and ReferencesDaubechies Wavelets
Journal ArticleDOI
Visual Cryptography for General Access Structures
TL;DR: This paper examines graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme, and provides a novel technique for realizing threshold visual cryptography schemes.