An efficient and secure technique for image steganography using a hash function.
Zahid Iqbal NezamiHamid AliMuhammad AsifHanan AljuaidIsma HamidZulfiqar AliPublished in: PeerJ Comput. Sci. (2022)
Keyphrases
- hash functions
- stream cipher
- block cipher
- provably secure
- similarity search
- hashing algorithm
- hamming distance
- encryption scheme
- secret key
- chaotic map
- locality sensitive hashing
- data distribution
- hash tables
- key management
- pattern recognition
- hash table
- nearest neighbor search
- signature scheme
- database
- authentication scheme
- standard model
- binary codes
- high dimensional data
- integer wavelet transform