Steganographic manipulations with elliptic curve cryptography.
T. N. ShankarGadadhar SahooS. NiranjanPublished in: Int. J. Electron. Secur. Digit. Forensics (2012)
Keyphrases
- elliptic curve cryptography
- elliptic curve
- public key
- security analysis
- authentication scheme
- error correction
- data hiding
- digital watermark
- high security
- digital images
- public key cryptography
- spread spectrum
- spatial domain
- jpeg images
- smart card
- image encryption
- dct domain
- security requirements
- security model
- signal processing
- cover image
- discrete cosine transform
- transform domain