Steganography on Digital Color Image Using Modulo Function and Pseudo-Random Number Generator
Abstract
Keywords
Full Text:
PDFReferences
O. R. Shahin, A. Ben Aissa, Y. Fouad, H. Al-Mahdi, and M. Alsmarah, “A New Method of Data Encryption based on One to One Functions,†vol. 10, no. 3, pp. 1169–1175, 2020.
J. Katz and Y. Lindell, Introduction to Modern Cryptography. 2014.
A. S. Ansari, M. S. Mohammadi, and M. T. Parvez, “A multiple-format steganography algorithm for color images,†IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.2991130.
J. R. Jayapandiyan, C. Kavitha, and K. Sakthivel, “Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization,†IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3009234.
K. Wang and Q. Gao, “A Coverless Plain Text Steganography Based on Character Features,†IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2929123.
A. A. Alsabhany, F. Ridzuan, and A. H. Azni, “The Adaptive Multi-Level Phase Coding Method in Audio Steganography,†IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2940640.
X. Yi, K. Yang, X. Zhao, Y. Wang, and H. Yu, “Ahcm: Adaptive huffman code mapping for audio steganography based on psychoacoustic model,†IEEE Trans. Inf. Forensics Secur., vol. 14, no. 8, 2019, doi: 10.1109/TIFS.2019.2895200.
X. Duan et al., “High-Capacity Image Steganography Based on Improved FC-DenseNet,†IEEE Access, vol. 8, 2020, doi: 10.1109/access.2020.3024193.
X. Zhang, F. Peng, and M. Long, “Robust Coverless Image Steganography Based on DCT and LDA Topic Classification,†IEEE Trans. Multimed., vol. 20, no. 12, 2018, doi: 10.1109/TMM.2018.2838334.
O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, A. A. M. Khalaf, and H. M. Ali, “Hiding data in images using steganography techniques with compression algorithms,†Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 3, pp. 1168–1175, 2019, doi: 10.12928/TELKOMNIKA.V17I3.12230.
Z. Yahya, M. Hassan, S. Younis, and M. Shafique, “Probabilistic Analysis of Targeted Attacks Using Transform-Domain Adversarial Examples,†IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.2974525.
C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,†J. Syst. Softw., 2008, doi: 10.1016/j.jss.2007.01.049.
M. Asikuzzaman and M. R. Pickering, “An Overview of Digital Video Watermarking,†IEEE Transactions on Circuits and Systems for Video Technology. 2018, doi: 10.1109/TCSVT.2017.2712162.
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Cryptanalytic attacks on pseudorandom number generators,†1998, doi: 10.1007/3-540-69710-1_12.
M. Aljohani, I. Ahmad, M. Basheri, and M. O. Alassafi, “Performance Analysis of Cryptographic Pseudorandom Number Generators,†IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2907079.
G. Marsaglia, “Xorshift RNGs,†J. Stat. Softw., 2003, doi: 10.18637/jss.v008.i14.
S. Deshmukh, K. Doshi, and Y. Borse, “Securing Images Using Layered Morphing,†2018, doi: 10.1109/ICCUBEA.2018.8697888.
R. Munir, “Pengantar Ilmu Kriptografi,†Penerbit Andi, 2008, doi: 10.1017/CBO9781107415324.004.
I. J. Kadhim, P. Premaratne, P. J. Vial, and B. Halloran, “Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research,†Neurocomputing, vol. 335, 2019, doi: 10.1016/j.neucom.2018.06.075.
E. Emad, A. Safey, A. Refaat, Z. Osama, E. Sayed, and E. Mohamed, “A secure image steganography algorithm based on least significant bit and integer wavelet transform,†J. Syst. Eng. Electron., vol. 29, no. 3, 2018, doi: 10.21629/JSEE.2018.03.21.
DOI: http://dx.doi.org/10.18517/ijaseit.11.6.12687
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development