Figure - uploaded by Ali M. El-Rifaie
Content may be subject to copyright.
Source publication
The paper proposes a robust crypto-steganography approach that secures the data without affecting it and efficient anti-forgery tool. The proposed approach consists of main three security levels with n-round sub-levels. The hybridization of crypto-chaos based tools with various data hiding tools is performed perfectly. The paper carried out several...
Context in source publication
Context 1
... last scenario considers the highest quality of the decrypted/extracted/decrypted classified image, as cleared in the results in Figure 28, 29 and Table 6. In previous presented experiments, the developed interactive/expandable crypto-steganography security system has been evaluated and tested to for measuring its robustness and applicability. ...