@article{Prof. A. N. Gedam_Pooja Nehul_Sushant Shinde_Irshad Shaikh_2017, title={An Information Security Technique Using Steganography}, volume={4}, url={https://ijaerd.com/index.php/IJAERD/article/view/2143}, abstractNote={<p>This technology proposes a lossless, a reversible, and a combined knowledge activity schemes for cipher text<br>pictures encrypted by public key cryptosystems with probabilistic and holomorphic properties. Within the lossless theme,<br>the cipher text pixels are replaced with new values to introduce the extra knowledge into many LSB-planes of cipher text<br>pixels by multiple layer wet paper writing. Then, the embedded knowledge are often directly extracted from the encrypted<br>domain and therefore the knowledge embedding operation doesn’t have an effect on the secret writing of original<br>plaintext image. Within the reversible theme, a preprocessing is used to shrink the image bar chart before image coding,<br>so the modification on encrypted pictures for knowledge embedding won’t cause any component oversaturation in<br>plaintext domain. Though a small distortion is introduced, the embedded knowledge is often extracted and therefore the<br>original image are often recovered from the directly decrypted image. As a result of the compatibility between the<br>lossless and reversible schemes, the info embedding operations within the 2 manners are often at the same time<br>performed in associate degree encrypted image. With the combined technique, a receiver could extract a neighborhood<br>of embedded knowledge before secret writing, and extract another part of embedded knowledge and recover the first<br>plaintext image when secret writing.</p>}, number={3}, journal={International Journal of Advance Engineering and Research Development (IJAERD)}, author={Prof. A. N. Gedam and Pooja Nehul and Sushant Shinde and Irshad Shaikh}, year={2017}, month={Mar.}, pages={649–655} }