{"title":"一种基于小波变换的混沌映射隐写技术","authors":"R. Latha, R. Premkumar, S. Anand","doi":"10.1109/ICCTCT.2018.8551076","DOIUrl":null,"url":null,"abstract":"Cryptography and steganography unit to ancient techniques for secret communication. Knowledge protection is presently an enormous cringe and good answer to the current disadvantage is cryptography and steganography. Throughout this planned work a system is developed throughout that riffle work primarily based Steganography degreed Cryptography victimization chaotic map is combined on to provide high security to the message throughout communication in associate degree unsecure channel. In WT primarily based Steganography taking advantage of the suggests that the human eye perceives photos, the technique involves of substitution the chaos bits of each constituent of a instrumentality image with the knowledge of a hidden message. Cryptography supported chaotic network is used as a result of its noise like behavior that's quite necessary for decipherer to grasp relating to the hidden knowledge as a results of its durable to predict. That the knowledge is being unbroken secret. Throughout this work we've thought-about the advantages of every the ideas associated developed a model throughout that originally a message is embedded in an particularly RGB image victimization riffle steganography that the stego image is encrypted victimization chaotic neural network to provide high security to the message. The simulation results shows that offer hardiness of the technique.","PeriodicalId":344188,"journal":{"name":"2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Efficient Wavelet Transform Based Steganography Technique Using Chaotic Map\",\"authors\":\"R. Latha, R. Premkumar, S. Anand\",\"doi\":\"10.1109/ICCTCT.2018.8551076\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography and steganography unit to ancient techniques for secret communication. Knowledge protection is presently an enormous cringe and good answer to the current disadvantage is cryptography and steganography. Throughout this planned work a system is developed throughout that riffle work primarily based Steganography degreed Cryptography victimization chaotic map is combined on to provide high security to the message throughout communication in associate degree unsecure channel. In WT primarily based Steganography taking advantage of the suggests that the human eye perceives photos, the technique involves of substitution the chaos bits of each constituent of a instrumentality image with the knowledge of a hidden message. Cryptography supported chaotic network is used as a result of its noise like behavior that's quite necessary for decipherer to grasp relating to the hidden knowledge as a results of its durable to predict. That the knowledge is being unbroken secret. Throughout this work we've thought-about the advantages of every the ideas associated developed a model throughout that originally a message is embedded in an particularly RGB image victimization riffle steganography that the stego image is encrypted victimization chaotic neural network to provide high security to the message. The simulation results shows that offer hardiness of the technique.\",\"PeriodicalId\":344188,\"journal\":{\"name\":\"2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)\",\"volume\":\"74 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCTCT.2018.8551076\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTCT.2018.8551076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Efficient Wavelet Transform Based Steganography Technique Using Chaotic Map
Cryptography and steganography unit to ancient techniques for secret communication. Knowledge protection is presently an enormous cringe and good answer to the current disadvantage is cryptography and steganography. Throughout this planned work a system is developed throughout that riffle work primarily based Steganography degreed Cryptography victimization chaotic map is combined on to provide high security to the message throughout communication in associate degree unsecure channel. In WT primarily based Steganography taking advantage of the suggests that the human eye perceives photos, the technique involves of substitution the chaos bits of each constituent of a instrumentality image with the knowledge of a hidden message. Cryptography supported chaotic network is used as a result of its noise like behavior that's quite necessary for decipherer to grasp relating to the hidden knowledge as a results of its durable to predict. That the knowledge is being unbroken secret. Throughout this work we've thought-about the advantages of every the ideas associated developed a model throughout that originally a message is embedded in an particularly RGB image victimization riffle steganography that the stego image is encrypted victimization chaotic neural network to provide high security to the message. The simulation results shows that offer hardiness of the technique.