Analysis of Image Steganography Techniques in Secure Online Voting

被引:0
|
作者
Rura, Lauretha [1 ]
Issac, Biju [1 ]
Haldar, Manas Kumar [1 ]
机构
[1] Swinburne Univ Technol, Sch Engn Comp & Sci, Kuching, Malaysia
关键词
image steganography; electronic voting; Least Significant Bit; palette-based; F5; spread spectrum;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [1] Secure electronic voting system based on image steganography
    School of Engineering, Computing and Science, Swinburne University of Technology , Kuching, Malaysia
    IEEE Conf. Open Syst., ICOS, 2011, (80-85):
  • [2] Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluation
    Deval, Rohit
    Gupte, Nachiket
    Pinto, Johann Kyle
    Modak, Adwaita Raj
    Verma, Akshat
    Sharma, Anirudh
    Raja, S. P.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2025, 17 (1-2)
  • [3] Novel and Secure Encoding and Hiding Techniques using Image Steganography: A Survey
    Ashwin, S.
    Kumar, S. Aravind
    Ramesh, J.
    Gunavathi, K.
    2012 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ENGINEERING AND ENERGY MANAGEMENT (ICETEEEM - 2012), 2012, : 171 - 177
  • [4] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [5] An analysis of LSB Based Image Steganography Techniques
    Thangadurai, K.
    Devi, G. Sudha
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [6] Analysis of LSB based image steganography techniques
    Chandramouli, R
    Memon, N
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2001, : 1019 - 1022
  • [7] Analysis of Spatial Domain Image Steganography Techniques
    Shelke, S. G.
    Jagtap, S. K.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 665 - 667
  • [8] Online Voting Verification with Cryptography and Steganography Approaches
    Rura, Lauretha
    Issac, Biju
    Haldar, Manas Kumar
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 125 - 129
  • [9] A Novel Secure Image Steganography Using Improved Logistic Map and DNA Techniques
    Sun, Shuliang
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (03): : 647 - 652
  • [10] Provably Secure Robust Image Steganography
    Yang, Zijin
    Chen, Kejiang
    Zeng, Kai
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON MULTIMEDIA, 2024, 26 : 5040 - 5053