2,738 Hits in 6.3 sec

A New Steganography Method Based on the Complex Pixels

Amin Hashemi Pour, Ali Payandeh
2012 Journal of Information Security  
Today steganography has attracted the attention of many researchers. In this paper, we propose a new steganography method for secure Data communication on half tone pictures.  ...  In this method, the complexity of every pixel in picture is computed, then a neibourhood is defined to compute the complexity of every pixel, and then the complexity of every pixel is computed in the neibourhood  ...  So if the considered bit dh equals zero, the new value of pixel p is zero, and if the new pixel value be one, the new pixel value will be 255.  ... 
doi:10.4236/jis.2012.33025 fatcat:k6s6a2tbafe75aw33qlejdqvuy

Working and Comparative Analysis of Various Spatial Based Image Steganography Techniques

Dimple Anandpara, Amit Kothari
2015 International Journal of Computer Applications  
This is a very simple method to implement.  ...  General Terms Data Hiding Keywords Steganography, spatial domain, LSB  Patchwork method Gray level modification technique [1] modifies gray level values of the image pixels for mapping secret data.  ...  Pixel Value Differencing (PVD) Technique The PVD method [13, 14] first find difference between two non overlapping neighborhood pixels, then on the base of difference value decide the pixel belongs to  ... 
doi:10.5120/19876-1880 fatcat:jhln34gvwncl5aebibostocnie

Steganography of Quantum Color Images Based on Blocking and Gray Level Difference

Gaofeng Luo, Ling Shi, Ammar Oad, Liang Zong
2020 Journal of Engineering Science and Technology Review  
To improve the concealment of steganographic embedding of secret messages and enhance embedding capacity, the present study proposed a quantum red-green-blue (RGB) image steganography based on image block  ...  Results demonstrate that quantum RGB image steganography has a steganographic capacity of four bits per pixel, and its quantum circuit is less complex.  ...  Acknowledgements This work was supported by the Research Foundation of Education Bureau of Hunan Province, China (Grant Nos. 18B420 and 19B512).  ... 
doi:10.25103/jestr.131.13 fatcat:2vs2eelr6rfzzcj27wmdyrgsoi

Steganography Literature Survey, Classification and Comparative Study

Ayman El-Sayed, Gamal Attiya, Alaa Fkirin
2016 Communications on Applied Electronics  
The main idea is based on embedding important information in multimedia carrier such as: text, image, audio, and video. The developed methods may be classified as steganography and watermarking.  ...  This paper first presents a literature survey of information hiding, then classifies the proposed methods, and finally introduces a comparative study between the different methods.  ...  Communications on Applied Electronics (CAE) -ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USA Volume 5 -No.10, September  ... 
doi:10.5120/cae2016652384 fatcat:x5353d7735epboruonmpdz3ska

A New Information Hiding Method Based on Improved BPCS Steganography

Shuliang Sun
2015 Advances in Multimedia  
The regular method, black-and-white border complexity, is a simple and easy way, but it is not always useful, especially for periodical patterns.  ...  The important step of BPCS steganography is how to locate noisy regions in a cover image exactly.  ...  Acknowledgments This research was financially supported by a grant from the National Natural Science Foundation of China (no. 61473329) and the Special Research Foundation of the Fujian Province (Grant  ... 
doi:10.1155/2015/698492 fatcat:2kgffqwo7je3hauumnphnh2cqa

A Comparative Analysis of LSB, MSB and PVD Based Image Steganography

Alade Oluwaseun. Modupe, Amusan Elizabeth Adedoyin, Adedeji Oluyinka Titilayo
2021 International journal of research and review  
In this paper a comparative analysis of Least Significant Bit (LSB), Most Significant Bit (MSB) and Pixel Value Differencing (PVD) image steganography in grayscale and colored images was performed.  ...  A comparative performance analysis of LSB, MSB and PVD methods used in image steganography was performed using peak signal to noise ratio (PSNR), Mean square error (MSE) and Structural Similarity index  ...  The results of LSB based steganography and MSB based steganography was presented. Rohit Garg and Tarun Gulati (2012) focused on the comparison of LSB and MSB Based Steganography in Gray-Scale Images.  ... 
doi:10.52403/ijrr.20210948 fatcat:liw3dhc7pfhjnigizusu7uuwf4

E-govornence Data Security using Steganography, Concepts, Algorithms and Analysis

Tanmoy Halder, Sunil Karforma, Rupali Mandal
2014 International Journal of Applied Science and Engineering  
Modern day digital steganography has traveled through a long path of modification and development from basic LSB matching process to complex artificial intelligence based method.  ...  Steganography is the art of communicating in such a way that the existence of a secret information within another remains invisible.  ...  ., 2009 ) planned a LSB steganography approach based on texture analysis i.e. separating the image into simple and complex quality and hiding more data on complex textures than simple one.  ... 
doi:10.5958/2322-0465.2014.01116.2 fatcat:24rs6kt2brdg3fettm3q4eyys4

An Efficient and Secure Data Hiding Technique – Steganography

Abhilasha Ramdas Bhagat, A. Prof. Ashish B Dhembhare
2015 International Journal of Innovative Research in Computer and Communication Engineering  
C) Key based Steganography On the basis of keys the types of Steganography are of three types and these categories convey the level of security with which the stego message is embedded, hidden, transmitted  ...  Our new steganography uses a video as the carrier data, and we hide secret information in the bit-planes of the carrier.  ...  The method makes us able to detect the existence of pseudorandom message randomly spread in a color image with reliability based on statistical analysis of the image colors in the RGB pixel. L.M.  ... 
doi:10.15680/ijircce.2015.0302034 fatcat:6b5lg2oxrna3fphhykycolwt34


Ovidiu COSMA
2017 Carpathian Journal of Electrical Engineering  
This article proposes a steganography method that uses all three components of an image in the RGB color space to store secret data.  ...  The order in which the image pixels are processed is not given by their position within the image, but by their visual significance.  ...  Only the high complexity blocks will be used for placing the secret data. Another steganography technique based on BPCS is presented in [2] .  ... 
doaj:155a5532d1d545778b62178b31f36918 fatcat:tcdsria25zaybingvowd7mi7mq

Modification ratio estimation for a category of adaptive steganography

XiangYang Luo, FenLin Liu, ChunFang Yang, ShiGuo Lian
2010 Science China Information Sciences  
For the category of adaptive steganography satisfying these conditions, a general quantitative steganalysis method is presented based on specific areas and sample pair analysis.  ...  Then, for a typical adaptive steganography, some concrete methods are proposed to select specific areas and trace sets of sample pairs, and estimate the stego modification ratios.  ...  For arbitrary two adjacent pixels s i and s j in the same area, based on the function F , f (A k ) F (m), when F (m) > T , that is, f (A k ) F (m) > T .  ... 
doi:10.1007/s11432-010-4105-7 fatcat:swbteovnsngdfibqinr4heloum

Uncompressed Image Steganography using BPCS: Survey and Analysis

Vipul J Patel
2013 IOSR Journal of Computer Engineering  
In contrast, the BPCS algorithm provided a much more effective method for obtaining a 50% capacity since visual attacks did not suffice for detection.  ...  This paper discusses existing BPCS (Bit Plane Complexity Segmentation) steganography techniques and presences of some modification.  ...  The border noisiness complexity measure is computed based on the differences between adjacent binary pixel sequences in a block .Let the block size be (n > 1).  ... 
doi:10.9790/0661-1545764 fatcat:sosklwehnvdrfhpcnysrrtpt4q

A New Model for Hiding Text in an Image Using Logical Connective

Siti Dhalila Mohd Satar, Nazirah Abd Hamid, Fatimah Ghazali, Roslinda Muda, Mustafa Mamat
2015 International Journal of Multimedia and Ubiquitous Engineering  
This model can produce a low computational complexity of steganography because of the simplicity of the proposed algorithm.  ...  The objective of this study is to propose a new model for hiding text in an image. The proposed model use logical connective in propositional logic to calculate a new binary number of secret message.  ...  The authors proposed a new technique to enhance the security and the quality of the image steganography that based on LSB.  ... 
doi:10.14257/ijmue.2015.10.6.20 fatcat:huea7ft4wrfmto2biclnxmxhni

Text embedding using image steganography in spatial domain

P Srilakshmi, Ch Himabindu, N Chaitanya, S V. Muralidhar, M V. Sumanth, K Vinay
2018 International Journal of Engineering & Technology  
So this method is a highly secured from eavesdropping and highly complex to identify the text data in the image and retrieving the text message from the message is also a resilient process.  ...  In the proposed embedding the message is dumped into the image with reference to a random generated key, based on this key the extraction of text is done from the image.  ...  This paper is based on RGB colour model because of its unique properties of colour representation of a colour pixel.  ... 
doi:10.14419/ijet.v7i3.6.14922 fatcat:47fmsdakrnfzvfktu42b7e3hz4

Block Texture Pattern Detection Based on Smoothness and Complexity of Neighborhood Pixels

Amir Farhad Nilizadeh, Ahmad Reza Naghsh Nilchi
2014 International Journal of Image Graphics and Signal Processing  
In this paper, a novel method for detecting Block Texture Patterns (BTP), based on two measures: smoothness and complexity of neighborhood pixels is proposed.  ...  As an example, the applicability of BTP on data hiding algorithms is discussed, and the advantages of this classification on these algorithms are shown.  ...  Seyed Ali Shahshahani for initiating the idea for our research.  ... 
doi:10.5815/ijigsp.2014.05.01 fatcat:pmeutynrorfwhpix2o37byfze4

A Proposal to Improve the Bit Plane Steganography based on the Complexity Calculation Technique

Cho Do Xuan
2021 International Journal of Advanced Computer Science and Applications  
In this paper, based on the theoretical basis of the BPCS method, we propose a new method to improve the efficiency of the steganography process.  ...  The experimental results in the paper have not only demonstrated the effectiveness of our proposed method but also provided a new mechanism for digital image analysis in general and video steganography  ...  INTRODUCTION A. Introduction to BPCS Method In the study [1] , Kawaguchi et al. presented an image steganography method based on the BPCS technique.  ... 
doi:10.14569/ijacsa.2021.0120659 fatcat:wwgnyjt4gfcx3g6ef22wjrgcqm
« Previous Showing results 1 — 15 out of 2,738 results