A new approach for LSB based image steganography using secret key

SMM Karim, MS Rahman… - … conference on computer …, 2011 - ieeexplore.ieee.org
steganographic method that utilizes the secret key to hide the information into an input pixel
of cover image … pixel which is decided by the secret key. So anyone cannot exactly make a …

Steganography algorithm to hide secret message inside an image

R Ibrahim, TS Kuan - arXiv preprint arXiv:1112.2809, 2011 - arxiv.org
images using steganography technique. An algorithm is designed to hide all the data inputted
within the image to … The secret key in this proposed steganography algorithm is playing an …

Highly randomized image steganography using secret keys

S Dagar - International Conference on Recent Advances and …, 2014 - ieeexplore.ieee.org
… of steganography which uses image as a carrier and secret file as a … Image generated as
an outcome of steganography process which contains secret information is called stego image. …

Secret image sharing with steganography and authentication

CC Lin, WH Tsai - Journal of Systems and software, 2004 - Elsevier
… Use the secret key K as a seed for a pre-selected binary random number generating function
f to generate a sequence of m 2 binary numbers P 1 ,P 2 ,…,P m 2 . Regard each binary …

[PDF][PDF] A secret-key image steganography technique using random chain codes

MAF Al-Husainy, DM Uliyan - International Journal of Technology, 2019 - researchgate.net
… of the carrier image. In this paper, a secret key image steganography technique has been …
(codes) of the bytes in the carrier image. These chains have been constructed based on the …

[PDF][PDF] Key based visual cryptography scheme using novel secret sharing technique with steganography

P Bidgar, N Shahare - IOSR J. Electron. Commun. Eng.(IOSR-JECE), 2013 - academia.edu
… in which a symmetric secret key is used to encrypt the image and then secret shares are
generated from this image using Novel secret sharing technique with steganography. So, finally …

Invertible secret image sharing with steganography

PY Lin, CS Chan - Pattern Recognition Letters, 2010 - Elsevier
… participants with integrated shadows can cooperate to recover the secret key. The purpose
of secret sharing is to recover the secret key when some shadows are lost, distorted, or stolen…

Secret key estimation in sequential steganography

S Trivedi, R Chandramouli - IEEE Transactions on Signal …, 2005 - ieeexplore.ieee.org
… This paper presents a steganalysis method that estimates the secret key used in sequential
… Several techniques to make the steganalysis algorithm work for nonstationary digital image

[PDF][PDF] An overview of image steganography.

T Morkel, JHP Eloff, MS Olivier - ISSA, 2005 - academia.edu
… without the secret key [5]. … image steganographic techniques were discussed in this paper,
one can see that there exists a large selection of approaches to hiding information in images. …

A novel secure model: Image steganography with logistic map and secret key

M Ulker, B Arslan - … Symposium on Digital Forensic and Security …, 2018 - ieeexplore.ieee.org
steganography in secure communication. The aim of this paper is to provide secure
communication via a new image steganography using LSB method with secret key … of image