Downloads: 109
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme
Sneha A.Deshmukh | P.B.Sambhare
Abstract: To maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves hiding the data using data hiding algorithm to maintain the images secrecy. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key.
Keywords: Cover image, data hiding, data extraction, Image encryption, Image decryption and Data recovery, DWT
Edition: Volume 3 Issue 11, November 2014,
Pages: 2425 - 2428
Similar Articles with Keyword 'Cover image'
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V
Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair [2] | Fathima A Muhammadali