![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)
The demand of security is getting higher in these days due to the development of computers and Internet. In this paper, we proposed a novel image authentication scheme in frequency domain using SHA-1 that allo...
-
Chapter and Conference Paper
Image Secret Sharing in Stego-Images with Authentication
Recently, a polynomial-based (t,n) image sharing and hiding schemes with authentication was proposed to hid n shares of a secret image into n ordinary cover images and form n stego-images that can be transmitt...
-
Chapter and Conference Paper
A Huffman Code Based Image Steganography Technique
We present here a novel steganographic method based on Huffman coding and the least significant bit substitution in order to provide high embedding capacity, a strong security and imperceptible visual quality ...