A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
A New Steganography Method Based on the Complex Pixels
2012
Journal of Information Security
Today steganography has attracted the attention of many researchers. In this paper, we propose a new steganography method for secure Data communication on half tone pictures. ...
In this method, the complexity of every pixel in picture is computed, then a neibourhood is defined to compute the complexity of every pixel, and then the complexity of every pixel is computed in the neibourhood ...
So if the considered bit dh equals zero, the new value of pixel p is zero, and if the new pixel value be one, the new pixel value will be 255. ...
doi:10.4236/jis.2012.33025
fatcat:k6s6a2tbafe75aw33qlejdqvuy
Working and Comparative Analysis of Various Spatial Based Image Steganography Techniques
2015
International Journal of Computer Applications
This is a very simple method to implement. ...
General Terms Data Hiding Keywords Steganography, spatial domain, LSB Patchwork method Gray level modification technique [1] modifies gray level values of the image pixels for mapping secret data. ...
Pixel Value Differencing (PVD) Technique The PVD method [13, 14] first find difference between two non overlapping neighborhood pixels, then on the base of difference value decide the pixel belongs to ...
doi:10.5120/19876-1880
fatcat:jhln34gvwncl5aebibostocnie
Steganography of Quantum Color Images Based on Blocking and Gray Level Difference
2020
Journal of Engineering Science and Technology Review
To improve the concealment of steganographic embedding of secret messages and enhance embedding capacity, the present study proposed a quantum red-green-blue (RGB) image steganography based on image block ...
Results demonstrate that quantum RGB image steganography has a steganographic capacity of four bits per pixel, and its quantum circuit is less complex. ...
Acknowledgements This work was supported by the Research Foundation of Education Bureau of Hunan Province, China (Grant Nos. 18B420 and 19B512). ...
doi:10.25103/jestr.131.13
fatcat:2vs2eelr6rfzzcj27wmdyrgsoi
Steganography Literature Survey, Classification and Comparative Study
2016
Communications on Applied Electronics
The main idea is based on embedding important information in multimedia carrier such as: text, image, audio, and video. The developed methods may be classified as steganography and watermarking. ...
This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods. ...
Communications on Applied Electronics (CAE) -ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USA Volume 5 -No.10, September 2016www.caeaccess.org ...
doi:10.5120/cae2016652384
fatcat:x5353d7735epboruonmpdz3ska
A New Information Hiding Method Based on Improved BPCS Steganography
2015
Advances in Multimedia
The regular method, black-and-white border complexity, is a simple and easy way, but it is not always useful, especially for periodical patterns. ...
The important step of BPCS steganography is how to locate noisy regions in a cover image exactly. ...
Acknowledgments This research was financially supported by a grant from the National Natural Science Foundation of China (no. 61473329) and the Special Research Foundation of the Fujian Province (Grant ...
doi:10.1155/2015/698492
fatcat:2kgffqwo7je3hauumnphnh2cqa
A Comparative Analysis of LSB, MSB and PVD Based Image Steganography
2021
International journal of research and review
In this paper a comparative analysis of Least Significant Bit (LSB), Most Significant Bit (MSB) and Pixel Value Differencing (PVD) image steganography in grayscale and colored images was performed. ...
A comparative performance analysis of LSB, MSB and PVD methods used in image steganography was performed using peak signal to noise ratio (PSNR), Mean square error (MSE) and Structural Similarity index ...
The results of LSB based steganography and MSB based steganography was presented. Rohit Garg and Tarun Gulati (2012) focused on the comparison of LSB and MSB Based Steganography in Gray-Scale Images. ...
doi:10.52403/ijrr.20210948
fatcat:liw3dhc7pfhjnigizusu7uuwf4
E-govornence Data Security using Steganography, Concepts, Algorithms and Analysis
2014
International Journal of Applied Science and Engineering
Modern day digital steganography has traveled through a long path of modification and development from basic LSB matching process to complex artificial intelligence based method. ...
Steganography is the art of communicating in such a way that the existence of a secret information within another remains invisible. ...
., 2009 ) planned a LSB steganography approach based on texture analysis i.e. separating the image into simple and complex quality and hiding more data on complex textures than simple one. ...
doi:10.5958/2322-0465.2014.01116.2
fatcat:24rs6kt2brdg3fettm3q4eyys4
An Efficient and Secure Data Hiding Technique – Steganography
english
2015
International Journal of Innovative Research in Computer and Communication Engineering
english
C) Key based Steganography On the basis of keys the types of Steganography are of three types and these categories convey the level of security with which the stego message is embedded, hidden, transmitted ...
Our new steganography uses a video as the carrier data, and we hide secret information in the bit-planes of the carrier. ...
The method makes us able to detect the existence of pseudorandom message randomly spread in a color image with reliability based on statistical analysis of the image colors in the RGB pixel. L.M. ...
doi:10.15680/ijircce.2015.0302034
fatcat:6b5lg2oxrna3fphhykycolwt34
IMAGE STEGANOGRAPHY TAILORED TO OBJECTS CONTOURS
2017
Carpathian Journal of Electrical Engineering
This article proposes a steganography method that uses all three components of an image in the RGB color space to store secret data. ...
The order in which the image pixels are processed is not given by their position within the image, but by their visual significance. ...
Only the high complexity blocks will be used for placing the secret data. Another steganography technique based on BPCS is presented in [2] . ...
doaj:155a5532d1d545778b62178b31f36918
fatcat:tcdsria25zaybingvowd7mi7mq
Modification ratio estimation for a category of adaptive steganography
2010
Science China Information Sciences
For the category of adaptive steganography satisfying these conditions, a general quantitative steganalysis method is presented based on specific areas and sample pair analysis. ...
Then, for a typical adaptive steganography, some concrete methods are proposed to select specific areas and trace sets of sample pairs, and estimate the stego modification ratios. ...
For arbitrary two adjacent pixels s i and s j in the same area, based on the function F , f (A k ) F (m), when F (m) > T , that is, f (A k ) F (m) > T . ...
doi:10.1007/s11432-010-4105-7
fatcat:swbteovnsngdfibqinr4heloum
Uncompressed Image Steganography using BPCS: Survey and Analysis
2013
IOSR Journal of Computer Engineering
In contrast, the BPCS algorithm provided a much more effective method for obtaining a 50% capacity since visual attacks did not suffice for detection. ...
This paper discusses existing BPCS (Bit Plane Complexity Segmentation) steganography techniques and presences of some modification. ...
The border noisiness complexity measure is computed based on the differences between adjacent binary pixel sequences in a block .Let the block size be (n > 1). ...
doi:10.9790/0661-1545764
fatcat:sosklwehnvdrfhpcnysrrtpt4q
A New Model for Hiding Text in an Image Using Logical Connective
2015
International Journal of Multimedia and Ubiquitous Engineering
This model can produce a low computational complexity of steganography because of the simplicity of the proposed algorithm. ...
The objective of this study is to propose a new model for hiding text in an image. The proposed model use logical connective in propositional logic to calculate a new binary number of secret message. ...
The authors proposed a new technique to enhance the security and the quality of the image steganography that based on LSB. ...
doi:10.14257/ijmue.2015.10.6.20
fatcat:huea7ft4wrfmto2biclnxmxhni
Text embedding using image steganography in spatial domain
2018
International Journal of Engineering & Technology
So this method is a highly secured from eavesdropping and highly complex to identify the text data in the image and retrieving the text message from the message is also a resilient process. ...
In the proposed embedding the message is dumped into the image with reference to a random generated key, based on this key the extraction of text is done from the image. ...
This paper is based on RGB colour model because of its unique properties of colour representation of a colour pixel. ...
doi:10.14419/ijet.v7i3.6.14922
fatcat:47fmsdakrnfzvfktu42b7e3hz4
Block Texture Pattern Detection Based on Smoothness and Complexity of Neighborhood Pixels
2014
International Journal of Image Graphics and Signal Processing
In this paper, a novel method for detecting Block Texture Patterns (BTP), based on two measures: smoothness and complexity of neighborhood pixels is proposed. ...
As an example, the applicability of BTP on data hiding algorithms is discussed, and the advantages of this classification on these algorithms are shown. ...
Seyed Ali Shahshahani for initiating the idea for our research. ...
doi:10.5815/ijigsp.2014.05.01
fatcat:pmeutynrorfwhpix2o37byfze4
A Proposal to Improve the Bit Plane Steganography based on the Complexity Calculation Technique
2021
International Journal of Advanced Computer Science and Applications
In this paper, based on the theoretical basis of the BPCS method, we propose a new method to improve the efficiency of the steganography process. ...
The experimental results in the paper have not only demonstrated the effectiveness of our proposed method but also provided a new mechanism for digital image analysis in general and video steganography ...
INTRODUCTION
A. Introduction to BPCS Method In the study [1] , Kawaguchi et al. presented an image steganography method based on the BPCS technique. ...
doi:10.14569/ijacsa.2021.0120659
fatcat:wwgnyjt4gfcx3g6ef22wjrgcqm
« Previous
Showing results 1 — 15 out of 2,738 results