Cryptography and digital image steganography techniques

DK Sarmah, AJ Kulkarni, A Abraham… - Optimization Models in …, 2020 - Springer
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, A Abraham
Optimization Models in Steganography Using Metaheuristics, 2020Springer
Exchange of secure information between the sender and receiver draws the attention of
several researchers due to its importance in various fields ranging from national security
(Tutun et al. in Procedia Comput Sci 114: 132–138, 2017 [73]) to social profile (Gupta and
Dhami in J Direct Data Digit Mark Pract 17: 43–53, 2015 [29]). Cryptography (Coron in IEEE
Secur Priv 4: 70–73, 2006 [17]) and Steganography (Cheddad and Condell in Sig Process
90: 727–752, 2010 [14], Rabah in Inf Technol J 3: 245–269, 2004 [59]) are the two major …
Abstract
Exchange of secure information between the sender and receiver draws the attention of several researchers due to its importance in various fields ranging from national security (Tutun et al. in Procedia Comput Sci 114:132–138, 2017 [73]) to social profile (Gupta and Dhami in J Direct Data Digit Mark Pract 17:43–53, 2015 [29]). Cryptography (Coron in IEEE Secur Priv 4:70–73, 2006 [17]) and Steganography (Cheddad and Condell in Sig Process 90:727–752, 2010 [14], Rabah in Inf Technol J 3:245–269, 2004 [59]) are the two major streams dealing with information security. This chapter focuses on different techniques used for cryptography and steganography. The major emphasis is given on image steganography.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果