Über Some Mathematical Techniques in Image Steganography
This book proposed the creation of a secret key that acts as a roadmap for the embedding process and governs both the selection of hiding locations within the image and the amount of data concealed in each location. Two different approaches were used to generate this key, the first uses Linear Feedback Shift Registers (LFSRs), and the second uses a chaotic dynamic system. Furthermore, the randomness of the generated key was checked using the National Institute of Standards and Technology (NIST) tests to verify the randomness of the key.
Mehr anzeigen