Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 10 SI
Page No. 8875 - 8881

High Security Steganography Model Based on DWT, DCT and RSA

Authors : Ali KadhimBermani

References

Ahsan, K. and D. Kundur, 2002. Practical data hiding in TCP/IP. Proceedings of the Workshop on Multimedia Security at ACM Multimedia Vol. 2, December 6-9, 2002, ACM, Juan-les-Pins, France, pp: 1-8.

Al-Ataby, A. and F. Al-Naima, 2008. A modified high capacity image steganography technique based on wavelet transform. Intl. Arab J. Inf. Technol., 7: 358-364.

Ali, B.K.S.M.H. and A.B. Kadhim, 2016. An efficient steganography model using video compression and image steganography. J. Babylon Univ. Pure Appl. Sci., 24: 1145-1154.
Direct Link  |  

Arora, P., A. Agarwal and Jyoti, 2014. A steganographic method based on integer wavelet transform and genatic algorithm. Intl. J. Eng. Res. Appl., 4: 34-40.

Chen, P.Y. and H.J. Lin, 2006. A DWT based approach for image steganography. Int. J. Applied Sci. Eng., 4: 275-290.
Direct Link  |  

Chepuri, S., 2017. An RGB image encryption using RSA algorithm. Intl. J. Curr. Trends Eng. Res., 3: 1-7.
Direct Link  |  

Juneja, M. and P.S. Sandhu, 2009. Designing of robust image steganography technique based on LSB insertion and encryption. Proceedings of the International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom'09), October 27-28, 2009, IEEE, Kottayam, Kerala, India, ISBN:978-1-4244-5104-3, pp: 302-305.

Kapoor, P. and S. Patyal, 2014. DCT image compression for color images. Intl. J. Recent Innovation Trends Comput. Commun., 2: 3247-3252.

Lin, T. and J. Delp, 1999. A review of data hiding in digital images. Image Capture Syst. Conf., PICS, 52: 274-278.
Direct Link  |  

Lovepreet, K., 2014. Steganography process a review. Intl. J. Innovative Res. Comput. Commun. Eng., 2: 4857-4861.
Direct Link  |  

Morkel, T., J.H.P. Eloff and M.S. Olivier, 2005. An overview of image steganography. Proceedings of the 5th Annual Information Security South Africa Conference, June 29-June 1, Sandton, South Africa, pp: 1-12.

Reddy, H.M. and K.B. Raja, 2009. High capacity and security steganography using discrete wavelet transform. Intl. J. Comput. Sci. Secur., 3: 462-472.

Richard, P., 1998. An analysis of steganographic techniques. MSc Thesis, Faculty of Automatics, Department of Computer Science and Software Engineering, The University of Timisoara, ā€ˇTimisoara, Romania.

Verma, A., R. Nolkha, A. Singh and G. Jaiswal, 2013. Implementation of image steganography using 2-level DWT technique. Intl. J. Comput. Sci. Bus. Inf., 1: 1-14.
Direct Link  |  

Weiss, M., 2004. Principles of steganography. Introduction Cryptography, 1: 1-3.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved