Reference Hub9
Encrypted Information Transmission by Enhanced Steganography and Image Transformation

Encrypted Information Transmission by Enhanced Steganography and Image Transformation

Binay Kumar Pandey, Digvijay Pandey, Ashi Agarwal
Copyright: © 2022 |Volume: 14 |Issue: 1 |Pages: 14
ISSN: 2637-7888|EISSN: 2637-7896|EISBN13: 9781683183471|DOI: 10.4018/IJDAI.297110
Cite Article Cite Article

MLA

Pandey, Binay Kumar, et al. "Encrypted Information Transmission by Enhanced Steganography and Image Transformation." IJDAI vol.14, no.1 2022: pp.1-14. http://doi.org/10.4018/IJDAI.297110

APA

Pandey, B. K., Pandey, D., & Agarwal, A. (2022). Encrypted Information Transmission by Enhanced Steganography and Image Transformation. International Journal of Distributed Artificial Intelligence (IJDAI), 14(1), 1-14. http://doi.org/10.4018/IJDAI.297110

Chicago

Pandey, Binay Kumar, Digvijay Pandey, and Ashi Agarwal. "Encrypted Information Transmission by Enhanced Steganography and Image Transformation," International Journal of Distributed Artificial Intelligence (IJDAI) 14, no.1: 1-14. http://doi.org/10.4018/IJDAI.297110

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A deep neural network is used to develop a covert communication and textual data extraction strategy based on steganography and picture compression in such work. The original input textual image and cover image are both pre-processed before the covert text-based pictures are separated and implanted into the least significant bit of the cover object picture element using spatial steganography. Following that, stego-images are compressed and transformed(by using Leh Transformation) to provide a higher-quality image while also saving storage space at the sender's end. After then, the stego-image will be transmitted to the receiver over a communication link. At the receiver's end, steganography and compression are then reversed. This work contains a plethora of issues, making it an intriguing subject to pursue. The most crucial component of this task is choosing the right steganography and picture compression technology. The proposed technology, which combines picture steganography with compression and transformation, delivers higher peak signal-to-noise efficiency.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.