Data Encryption and Decryption Using image Steganography

被引:0
|
作者
EC Department, SRMCEM, India [1 ]
机构
来源
关键词
Cryptography - Data transfer - Electronic data interchange - High level languages - [!text type='HTML']HTML[!/text] - Sensitive data - Steganography - Web services - Websites;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Image encryption and decryption using fractional Fourier transform and radial Hilbert transform
    Joshi, Madhusudan
    Shakher, Chandra
    Singh, Kehar
    OPTICS AND LASERS IN ENGINEERING, 2008, 46 (07) : 522 - 526
  • [42] Image encryption/decryption system using 2-D cellular automata
    Chen, Rong-Jian
    Chen, Yuan-Hsin
    Chen, Chao-Shen
    Lai, Jui-Lin
    2006 IEEE TENTH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, PROCEEDINGS, 2006, : 651 - +
  • [43] Comparative Study of Image Encryption and Image Steganography Using Cryptographic Algorithms and Image Evaluation Metrics
    Chavali, Surya Teja
    Kandavalli, Charan Tej
    Sugash, T. M.
    Prakash, G.
    SEMANTIC INTELLIGENCE, ISIC 2022, 2023, 964 : 297 - 311
  • [44] A New Approach of Cryptography for Data Encryption and Decryption
    Masud, Khawja Imran
    Hasan, Md Rakib
    Hoque, MD. Mozammel
    Nath, Upel Dev
    Rahman, Md. Obaidur
    5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022), 2022, : 234 - 239
  • [45] Hybrid Image Encryption and Steganography Using SCAN Pattern for Secure Communication
    Hazra, Tapan Kumar
    Samanta, Rumna
    Mukherjee, Nilanjana
    Chakraborty, Ajoy Kumar
    2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 370 - 380
  • [46] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629
  • [47] A Novel Image Steganography Technique Using AES Encryption in DCT Domain
    Sahu, Aman
    Pradhan, Chittaranjan
    DISTRIBUTED COMPUTING AND INTELLIGENT TECHNOLOGY, ICDCIT 2023, 2023, 13776 : 349 - 354
  • [48] Using LU analysis to encryption the images formed after steganography of image into another image
    Al-Kufi, Mohammed Abdul Hameed Jassim
    Al-Salihi, Hussein Abbas Shniar
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (02): : 227 - 236
  • [49] Image Encryption and Decryption System with Clock Controlled Destruction
    Wang, Yingqi
    Wang, Luping
    Dong, Meixue
    Tang, Jiahua
    Sun, Mingze
    Wang, Ruilin
    Hu, Manyue
    Zhang, Hang
    2022 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, COMPUTER VISION AND MACHINE LEARNING (ICICML), 2022, : 90 - 93
  • [50] Image steganography with N-puzzle encryption
    Mukherjee, Srilekha
    Sanyal, Goutam
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (39-40) : 29951 - 29975