The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an RGB-based, secure technique to maintain and authenticate the integrity of a document. The novel Steganographic algorithm that we have proposed has its strength greatly enhanced by use of hybrid cryptography on data that is to be hidden in cover image. The secret message is converted into two kinds of plaintexts by subsequent ASCII and binary conversions and suitable bit stuffing...
In this paper, a technique for hiding the data of images using palette based approach with the concept of run length has been proposed. At the source, the image which is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size which will be adjusted by our resize function thereby removing the size constraint. The final...
In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. Cryptography involves converting a message text into an unreadable cipher. On the other hand,...
Protecting privacy for exchanging information through the media has been a topic researched by many people. Up to now, cryptography has always had its ultimate role in protecting the secrecy between the sender and the intended receiver. However, nowadays steganography techniques are used increasingly besides cryptography to add more protective layer to the hidden data. In this letter, we show that...
This paper discusses the design of a robust image steganography technique based on LSB (least significant bit) insertion and RSA encryption technique. Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. The application discussed in this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.