Secure Steganography Using Randomized Cropping.
Arijit SurVignesh RamanathanJayanta MukherjeePublished in: Trans. Data Hiding Multim. Secur. (2012)
Keyphrases
- image content
- jpeg compression
- privacy preserving association rule mining
- high capacity
- information hiding
- jpeg images
- security requirements
- key management
- security analysis
- cryptographic protocols
- data embedding
- lightweight
- security mechanisms
- security protocols
- sensitive data
- authentication protocol
- user authentication
- hidden information
- information security