EFFICIENT DATA HIDING WITH COMPRESSION AND EXENCRYPTION FOR SECURE SECRET SHARING – DATA HIDING
نویسندگان
چکیده
منابع مشابه
Secure Data Hiding Algorithm Using Encrypted Secret message
In any communication, security is the most important issue in today‟s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. This project is a combination of steganography and cryptography, which provides a strong backbone for its security. The scenario of present day of information security system includes co...
متن کاملSecure Modulus Data Hiding Scheme
In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when th...
متن کاملA Secure Data Hiding System
Data hiding is the process of embedding data into a media form such as image, voice, and video. The Lest Significant Bit (LSB) is consider as the most widely used embedding technique. LSB embeds the secret message's bits into the least significant bit plane of the image in a sequentially manner . The LSB is simple, but it poses some critical issues. The secret message is easily detected and att...
متن کاملA reversible high embedding capacity data hiding technique for hiding secret data in images
As the multimedia and internet technologies are growing fast, the transmission of digital media plays an important role in communication. The various digital media like audio, video and images are being transferred through internet. There are a lot of threats for the digital data that are transferred through internet. Also, a number of security techniques have been employed to protect the data ...
متن کاملHiding secret data into a carrier image
The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH
سال: 2020
ISSN: 2455-1457
DOI: 10.23883/ijrter.conf.20200315.028.qdmz0