[LIVRE][B] Digital image watermarking: theoretical and computational advances
The Book presents an overview of newly developed watermarking techniques in various
independent and hybrid domains Covers the basics of digital watermarking, its types …
independent and hybrid domains Covers the basics of digital watermarking, its types …
[PDF][PDF] High-security image steganography technique using XNOR operation and fibonacci algorithm
Since the number of internet users is increasing and sensitive information is exchanging
continuously, data security has become a problem. Image steganography is one of the ways …
continuously, data security has become a problem. Image steganography is one of the ways …
Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system
The most crucial task in real-time processing of steganography algorithms is to reduce the
computational delay and increase the throughput of a system. This critical issue is effectively …
computational delay and increase the throughput of a system. This critical issue is effectively …
An automated security approach of video steganography–based lsb using fpga implementation
S Abed, M Al-Mutairi, A Al-Watyan… - Journal of circuits …, 2019 - World Scientific
Steganography has become one of the most significant techniques to conceal secret data in
media files. This paper proposes a novel automated methodology of achieving two levels of …
media files. This paper proposes a novel automated methodology of achieving two levels of …
[PDF][PDF] Dual cellular automata on FPGA: An image encryptors chip
R Amirtharajan - Research Journal of Information Technology, 2014 - researchgate.net
A ESTRA (" T Secure data transmission plays a crucial role in today's world. While the data
in the form of images are required extensively, the need to safeguard the original images …
in the form of images are required extensively, the need to safeguard the original images …
Crypto‐Stego‐Real‐Time (CSRT) System for Secure Reversible Data Hiding
L Desai, S Mali - VLSI Design, 2018 - Wiley Online Library
Due to demand of information transfer through higher speed wireless communication
network, it is time to think about security of important information to be transferred. Further …
network, it is time to think about security of important information to be transferred. Further …
[PDF][PDF] Space filling curve for data filling: an embedded security approach
R Amirtharajan - Research Journal of Information Technology, 2014 - researchgate.net
A ESTRA (" T Embedded devices have taken a prominent role in today's data
communication. Steganography, an ancient method has immense budding to shield …
communication. Steganography, an ancient method has immense budding to shield …
[PDF][PDF] Audio fingerprint indicator in embedded platform: A way for hardware steganography
R Amirtharajan - Journal of Artificial Intelligence, 2014 - researchgate.net
A ISTRA ("|"" l'he increased intimidation in pilfering copyrighted multimedia files demands
the imprint of ownership identity called fingerprint in videolaudio files. This would aid to …
the imprint of ownership identity called fingerprint in videolaudio files. This would aid to …
Design and hardware implementation of a separable image steganographic scheme using public-key cryptosystem
In this paper, a novel and efficient hardware implementation of steganographic cryptosystem
based on a public-key cryptography is proposed. Digital images are utilized as carriers of …
based on a public-key cryptography is proposed. Digital images are utilized as carriers of …
[PDF][PDF] Comparative Analysis of (5/3) and Haar IVVT Based Steganography* V. Thanikaiselvan,'P. Arulmozhivarman," Siddhanta Chakrabarty," Ashutosh Agarwal,* S …
V Thanikaiselvan - Information Technology Journal, 2014 - researchgate.net
Steganography is the technique of hiding information inside other information. It provides
data security. Image steganography can be implemented in both, the spatial and transform …
data security. Image steganography can be implemented in both, the spatial and transform …