Analysis of Image Steganography Techniques in Secure Online Voting

被引:0
|
作者
Rura, Lauretha [1 ]
Issac, Biju [1 ]
Haldar, Manas Kumar [1 ]
机构
[1] Swinburne Univ Technol, Sch Engn Comp & Sci, Kuching, Malaysia
关键词
image steganography; electronic voting; Least Significant Bit; palette-based; F5; spread spectrum;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [31] Secure Online Voting System Using Biometric and Blockchain
    Pawade, Dipti
    Sakhapara, Avani
    Badgujar, Aishwarya
    Adepu, Divya
    Andrade, Melvita
    DATA MANAGEMENT, ANALYTICS AND INNOVATION, ICDMAI 2019, VOL 1, 2020, 1042 : 93 - 110
  • [32] A comprehensive study on image steganography and steganalysis techniques
    Amsaveni, A.
    Vanathi, P.T.
    International Journal of Information and Communication Technology, 2015, 7 (4-5) : 406 - 424
  • [33] Neural Network Approach to Image Steganography Techniques
    Jarusek, Robert
    Volna, Eva
    Kotyrba, Martin
    MENDEL 2015: RECENT ADVANCES IN SOFT COMPUTING, 2015, 378 : 317 - 327
  • [34] Randomization Strategies in Image Steganography Techniques: A Review
    Abadin, A. F. M. Zainul
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 3139 - 3171
  • [35] Review on spatial domain image steganography techniques
    Sirisha, B. Lakshmi
    Mohan, B. Chandra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1873 - 1883
  • [36] Image steganography based on SVD and DWT techniques
    Sirisha, B. Lakshmi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (03): : 779 - 786
  • [37] A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information
    Mustafa, Ghulam
    Ashraf, Rehan
    Ul Haq, Inam
    Khalid, Yusra
    Ul Islam, Rafiq
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, ENGINEERING, AND DESIGN (ICCED), 2019,
  • [38] Performance Evaluation Parameters of Image Steganography Techniques
    Pradhan, Anita
    Sahu, Aditya Kumar
    Swain, Gandharba
    Sekhar, K. Raja
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [39] An efficient and secure technique for image steganography using a hash function
    Nezami, Zahid Iqbal
    Ali, Hamid
    Asif, Muhammad
    Aljuaid, Hanan
    Hamid, Isma
    Ali, Zulfiqar
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [40] Secure image steganography using framelet transform and bidiagonal SVD
    Mansi S. Subhedar
    Vijay H. Mankar
    Multimedia Tools and Applications, 2020, 79 : 1865 - 1886