Journal article Open Access

Implementation of Steganographic Algorithms Based on Exact Histogram Matching and Colour Visual Cryptography

Thottempudi Pardhu; R. Sateesh; K. Naveen; K. Mani Raj


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Steganography; Colour visual cryptography; Exact histogram specification; Meaningful Shares</subfield>
  </datafield>
  <controlfield tag="005">20211027134850.0</controlfield>
  <controlfield tag="001">5602391</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Assistant Professor, Dept of ECE, MLR  Institute of Technology (Hyderabad) India.</subfield>
    <subfield code="a">R. Sateesh</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Assistant Professor, Dept of ECE, MLR  Institute of Technology (Hyderabad) India.</subfield>
    <subfield code="a">K. Naveen</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Assistant Professor, Dept of ECE, MLR  Institute of Technology (Hyderabad) India.</subfield>
    <subfield code="a">K. Mani Raj</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Publisher</subfield>
    <subfield code="4">spn</subfield>
    <subfield code="a">Blue Eyes Intelligence Engineering  &amp; Sciences Publication(BEIESP)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">429639</subfield>
    <subfield code="z">md5:4187c8352ea250abe5fbf906dd4ed3ae</subfield>
    <subfield code="u">https://zenodo.org/record/5602391/files/B3006129219.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-12-30</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:5602391</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">519-522</subfield>
    <subfield code="n">2</subfield>
    <subfield code="p">International Journal of Engineering and Advanced Technology (IJEAT)</subfield>
    <subfield code="v">9</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Assistant Professor, Dept of ECE, MLR  Institute of Technology (Hyderabad) India.</subfield>
    <subfield code="a">Thottempudi Pardhu</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Implementation of Steganographic Algorithms  Based on Exact Histogram Matching and Colour  Visual Cryptography</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">ISSN</subfield>
    <subfield code="0">(issn)2249-8958</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">Retrieval Number</subfield>
    <subfield code="0">(handle)B3006129219/2019©BEIESP</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;Sensitive secret data transmission through internet has been of great security concern which can be overcome by steganographic methods achieved through secret image sharing. Two novel steganographic secret algorithms based on colour visual cryptography and exact histogram specification is proposed in the present study. The former approach combines colour visual cryptography with a secret key to produce less distorted meaningful share images. A specified histogram acts as the key for the second approach and provides better security and data obscurity compared to conventional approaches. A novel histogram specification method is also proposed which exactly matches the histogram of an image to a specified histogram.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">issn</subfield>
    <subfield code="i">isCitedBy</subfield>
    <subfield code="a">2249-8958</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.35940/ijeat.B3006.129219</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
12
15
views
downloads
Views 12
Downloads 15
Data volume 6.4 MB
Unique views 12
Unique downloads 15

Share

Cite as