User Manual
Why can I only view 3 results?
You can only view all results when you connect from the network of institutions that are members. We offer a 1-month free trial version for institutions that are not members upon application by institution officials.
A lot of results that are not mine are coming?
Since citations are shown as "Surname, I" in many references, citations of academics with the same surname and first letter of their name can sometimes get mixed up. This is a common problem in citation indexes all over the world.
How can I only see the citations made to my relevant article?
After searching for the name of your article, you can see the citations made to the article you selected as soon as you click on the details section.
WXCYxIUBYqxAIGX2iOcQ
 Views 66
 Downloands 4
MULTILEVEL DATA CONCEALING TECHNIQUE USING STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY
2023
Author :  
Abstract :

Steganography is a method for concealing data that makes use of a cover medium like pictures, music, or video. Security now requires a strong understanding of cryptography. Image One such technique to hide hidden messages in images to make them less susceptible to cryptanalysis is steganography. Because textual steganography is simpler to intercept and decode than other types, we are able to overcome its disadvantages. We use the XOR and One Time Pad (OTP) Algorithms to encrypt the plaintext using a randomly generated key before embedding it into the Least Significant Bit (LSB) of the cover picture. To create the Stego picture, we embed the cypher text in the LSB of the cover image's pixels. In order to enhance and guarantee security, we make use of visual cryptography and picture scrambling. Image scrambling is a method that hides the position of pixels to give the Stego image additional security. Visual information is encrypted using visual cryptography, which divides it into shares. The technique is made more secure and difficult to decipher by using both picture scrambling and visual cryptography. This study also develops a decryption technique for the same.

Keywords :