Analysis of image steganography techniques in secure online voting

Rura, Lauretha, Issac, Biju and Haldar, Manas (2012) Analysis of image steganography techniques in secure online voting. In: Proceedings of 2011 International Conference on Computer Science and Network Technology. IEEE, pp. 120-124. ISBN 978-1-4577-1586-0

Full text not available from this repository.
Official URL: http://dx.doi.org/10.1109/ICCSNT.2011.6181922

Abstract

As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.

Item Type: Book Section
Uncontrolled Keywords: image steganography, electronic voting, Least Significant Bit, palette-based, F5, spread spectrum
Subjects: G900 Others in Mathematical and Computing Sciences
Department: Faculties > Engineering and Environment > Computer and Information Sciences
Depositing User: Becky Skoyles
Date Deposited: 18 Dec 2018 11:51
Last Modified: 18 Dec 2018 11:51
URI: http://nrl.northumbria.ac.uk/id/eprint/37323

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics


Policies: NRL Policies | NRL University Deposit Policy | NRL Deposit Licence