Review – An approach to steganography technique
Abstract
Full Text:
PDFReferences
M. Radhika Mani, V. Lalithya, and P.Swetha Rekha. “An innovative approach for pattern based image steganography”, IEEE, presented at the Int. conf. signal processing, informatics, communication and energy systems, pp. 1-4, Feb. 2015.
Nadeem Akhtar, Shahbaaz Khan, and Pragati Johri, “An improved inverted LSB image steganography”, IEEE, Int. Conf. on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 749-755, Feb. 2014.
P Sandeep Reddy and Kalpana Reddy, “Hiding image in video”, International Journal of Research Sciences and Advanced Engineering (IJRSAE) TM Volume 2, Issue 8, pp. 87 - 91, Oct - Dec 2014.
K B Shiva Kumar, K B Raja, R K Chhotaray, and Sabyasachi Pattanaik, “Bit length replacement steganography based on DCT coefficients”, ResearchGate, International Journal of Engineering Science and Technology, ISSN: 0975-5462, Vol. 2(8), pp. 3561-3570, 2010.
Barnali Gupta Banik and Samir Kumar Bandyopadhyay, “Implementation of image steganography algorithm using scrambled image and quantization coefficient modification in DCT”, IEEE Int. conf. on Research in Computational intelligence and Communication networks (ICRCICN) ,pp. 400-405, Nov. 2015.
Neda Raftari and Amir Masoud Eftekhari Moghadam, “Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT”, IEEE Fourth Int. conf. on Computational Intelligence, Communication Systems and Networks, pp. 295-300, July. 2012.
Prajanto Wahyu Adi, Farah Zakiyah Rahmanti and Nur Azman Abu, “High Quality Image Steganography on Integer Haar Wavelet Transform using Modulus Function”, IEEE Int. conf. on Science in Information Technology (ICSITech), pp. 79-84, Oct. 2015
Mohammad Reza Dastjani Farahani and Ali Pourmohammad, “A DWT Based Perfect Secure and High Capacity Image Steganography Method”, IEEE Int. conf. on Parallel and Distributed Computing, Applications and Technologies, pp. 314-317, Dec. 2013.
Sudhir Keshari and Shri Gopal Modani, “Weighted Fractional Fourier Transform based Image Steganography”, IEEE Int. conf. on Recent Trends in Information Systems, pp. 214-217, Dec. 2011.
Heba Mostafa, Ahmed Fouad Ali, and Ghada EI Taweal, “Hybrid curvelet transform and least significant bit for image steganography”, IEEE Seventh Int. Conf. on Intelligent Computing and Information Systems (ICICIS'15), pp. 300-305, Dec. 2015.
DOI: https://doi.org/10.37628/jdcas.v2i2.312
Refbacks
- There are currently no refbacks.