This book described a generalized approach pertaining to essential concepts of steganographic techniques insight into the fundamentals. Steganographic techniques are illustrated using flow diagram, algorithms, and examples along with various parametric tests like PSNR, IF, Error analysis, Histogram analysis and comparison of relative performances of various techniques using number of benchmark images. The contributions are divided into two categories namely in spatial domain and frequency domain. Steganographic approaches described fall under single bit, two bits, three bits steganography...
This book described a generalized approach pertaining to essential concepts of steganographic techniques insight into the fundamentals. Steganographic...
This book prescribed various low computation based symmetric encryption techniques which has major relevance in terms of security in modern day s utilities. Starting from introductory definitions, six symmetric techniques RCA, RKR, RSKA, CAOPB, RMOPB and CRKRTAB, their analysis and usages are described. Five are cyclic and rest is cascaded in nature. Various parametric tests such as Chi Square, frequency distribution are applied and analyzed along with secrete and session key based encryption process. For the purpose of easy understanding examples are associated with each along with the...
This book prescribed various low computation based symmetric encryption techniques which has major relevance in terms of security in modern day s util...