scispace - formally typeset
Proceedings ArticleDOI

Secret Sharing Using 3 Level DWT Method of Image Steganography Based on Lorenz Chaotic Encryption and Visual Cryptography

Reads0
Chats0
TLDR
A new technique of Image Steganography has been proposed which is using Lorenz Chaotic Encryption to encrypt the secret message, 3 level Discrete Wavelet Transform to hide encrypted data and visual cryptography to share stego image in secret communication.
Abstract
Steganography is a traditional technique of covert communication. It is also best way to conceal secret data without revealing its existence to the outsider. In this paper a new technique of Image Steganography has been proposed which is using Lorenz Chaotic Encryption to encrypt the secret message, 3 level Discrete Wavelet Transform to hide encrypted data and visual cryptography to share stego image in secret communication.

read more

Citations
More filters
Journal ArticleDOI

Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

TL;DR: From the analysis, it shows that the proposed wavelet-based secret image sharing scheme with encrypted shadow images using optimal Homomorphic Encryption (HE) technique provide greater security compared to other existing schemes.
Journal ArticleDOI

Secure grayscale image communication using significant visual cryptography scheme in real time applications

TL;DR: The performance analysis proves that (k, n) SVC improves the quality of the reconstructed secret image with increased Peak Signal-to-Noise Ratio (PSNR) up to 21% and Pixel error is calculated as Mean Square Error (MSE) and it is reduced up to 77%.
Proceedings ArticleDOI

Puzzle based highly secure steganography

TL;DR: The outcome indicate that the recommended approach provides high steganographic security while providing high embedding capacity of about 5 bits per pixel.
Journal ArticleDOI

Accurate Device-Free Tracking Using Inexpensive RFIDs.

TL;DR: RDTrack is effective in tracking the moving target, with a low tracking error of 32 cm, and its accuracy is robust for different environments, highlighting RDTrack’s ability to enable future essential device-free moving-based interaction with RFID devices.
Dissertation

Cryptography and computer communications security : extending the human security perimeter through a web of trust

TL;DR: The author states that the aim of this book is to contribute towards the humanizing of mathematics and its application in the field of education.
References
More filters
Book

A wavelet tour of signal processing

TL;DR: An introduction to a Transient World and an Approximation Tour of Wavelet Packet and Local Cosine Bases.
Journal ArticleDOI

Deterministic nonperiodic flow

TL;DR: In this paper, it was shown that nonperiodic solutions are ordinarily unstable with respect to small modifications, so that slightly differing initial states can evolve into considerably different states, and systems with bounded solutions are shown to possess bounded numerical solutions.
Journal ArticleDOI

Zur Theorie der orthogonalen Funktionensysteme

Alfred Haar
TL;DR: In der Theorie der Reihenentwicklung der reellen Funktionen spielen die sog. orthogonalen Funktionensysteme eine fuhrende Rolle.
Reference BookDOI

A Primer on Wavelets and Their Scientific Applications

TL;DR: Haar WaveletsThe Haar TransformConservation and Compaction of EnergyRemoving Noise from Audio SignalsHaarWaveletsMultiresolution AnalysisCompression of audio SignalsRemoving noise from AudiosignalsNotes and ReferencesDaubechies Wavelets
Journal ArticleDOI

Visual Cryptography for General Access Structures

TL;DR: This paper examines graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme, and provides a novel technique for realizing threshold visual cryptography schemes.
Related Papers (5)