Analysis of image steganography techniques in secure online voting

Lauretha Rura*, Biju Issac, Manas Kumar Haldar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.

Original languageEnglish
Title of host publicationProceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011
PublisherIEEE
Pages120-124
Number of pages5
Volume1
ISBN (Print)9781457715846
DOIs
Publication statusPublished - 12 Apr 2012
Externally publishedYes
Event2011 International Conference on Computer Science and Network Technology, ICCSNT 2011 - Harbin, China
Duration: 24 Dec 201126 Dec 2011

Conference

Conference2011 International Conference on Computer Science and Network Technology, ICCSNT 2011
Country/TerritoryChina
CityHarbin
Period24/12/1126/12/11

Keywords

  • electronic voting
  • F5
  • image steganography
  • Least Significant Bit
  • palette-based
  • spread spectrum

Fingerprint

Dive into the research topics of 'Analysis of image steganography techniques in secure online voting'. Together they form a unique fingerprint.

Cite this