Some Mathematical Techniques in Image Steganography
English

About The Book

This book proposed the creation of a secret key that acts as a roadmap for the embedding process and governs both the selection of hiding locations within the image and the amount of data concealed in each location. Two different approaches were used to generate this key the first uses Linear Feedback Shift Registers (LFSRs) and the second uses a chaotic dynamic system. Furthermore the randomness of the generated key was checked using the National Institute of Standards and Technology (NIST) tests to verify the randomness of the key.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE