Analysis of Image Steganography Techniques in Secure Online Voting

被引:0
|
作者
Rura, Lauretha [1 ]
Issac, Biju [1 ]
Haldar, Manas Kumar [1 ]
机构
[1] Swinburne Univ Technol, Sch Engn Comp & Sci, Kuching, Malaysia
关键词
image steganography; electronic voting; Least Significant Bit; palette-based; F5; spread spectrum;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.
引用
收藏
页码:120 / 124
页数:5
相关论文
共 50 条
  • [41] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [42] Image Segmentation to Secure LSB2 Data Steganography
    Zaini, Hatim Ghazi
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (01) : 6632 - 6636
  • [43] Secure Binary Image Steganography With Distortion Measurement Based on Prediction
    Yeung, Yuileong
    Lu, Wei
    Xue, Yingjie
    Huang, Jiwu
    Shi, Yun-Qing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (05) : 1423 - 1434
  • [44] A novel secure channel selection rule for spatial image steganography
    Tuan Duc Nguyen
    Arch-int, Somjit
    Arch-int, Ngamnij
    PROCEEDINGS OF THE 2015 12TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2015, : 230 - 235
  • [45] A Secure Image Steganography Technique Using Integer Wavelet Transform
    Hemalatha, S.
    Renuka, A.
    Acharya, U. Dinesh
    Kamath, Priya R.
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 755 - 758
  • [46] A Secure Color Image Steganography Using Integer Wavelet Transform
    Jothy, N.
    Anusuyya, S.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [47] Secure Halftone Image Steganography Based on Pixel Density Transition
    Lu, Wei
    Xue, Yingjie
    Yeung, Yuileong
    Liu, Hongmei
    Huang, Jiwu
    Shi, Yun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1137 - 1149
  • [48] Enhanced Secure Image Steganography using Double Encryption Algorithms
    Manjula, Y.
    Shivakumar, K. B.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 705 - 708
  • [49] Multi Secure and Robustness for Medical Image Based Steganography Scheme
    Prabakaran, G.
    Bhavani, R.
    Rajeswari, P. S.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 1188 - 1193
  • [50] Secure halftone image steganography with minimizing the distortion on pair swapping
    Liu, Wanteng
    Yin, Xiaolin
    Lu, Wei
    Zhang, Junhong
    Zeng, Jinhua
    Shi, Shaopei
    Mao, Mingzhi
    SIGNAL PROCESSING, 2020, 167 (167)