High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm
نویسندگان
چکیده
منابع مشابه
Data Security with Image Clustering using Steganography
Steganography is art of invisible Communication. It strives to hide the existence of communicated message in appropriate medium i.e. Image, Audio or Video. So as not to arouse an eavesdropper’s suspicion. Various techniques with Objectives of robustness, Payload and Undetectability are available and have their respective pros and cons. Various Steganography Techniques are employed depending on ...
متن کاملImage Steganography Optimization Technique
This paper presents a novel steganography technique which combines Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). The objective is to maximize the capacity and invisibility of the secret image with minimal modification to the cover image (at most k-bits per block). The secret image is transformed to frequency domain using DCT. An algorithm is employed to construct the optimum ...
متن کاملImage Steganography Using Modified Kekre Algorithm
The main goal of steganography is to hide information in the other cover media so that other person will not notice the presence of the information. This is a major distinction between this method and the other methods of covert exchange of information because, for example, in cryptography, the individuals notice the information by seeing the coded information but they will not be able to compr...
متن کاملA Secure And High Capacity Image Steganography Technique
Steganography is the science of “invisible” communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer Wavelet Transform (IWT). There is no...
متن کاملGenetic Algorithm Based Substitution Technique of Image Steganography
Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. Naturally, there are security agents who would like to fight these data hiding systems by steganalysis, i.e. discovering covered messages and rendering them useless. There is currently no steganography system which can resist all steganalysis attacks. The most n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2020
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2020.0111064