Filters








1,341 Hits in 5.6 sec

Locating secret messages in images

Ian Davidson, Goutam Paul
2004 Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '04  
Typically, of the top third of one percent of most energized pixels (outliers), we find that 87% are stego-bearing in color images and 61% in grayscale images.  ...  Steganography involves hiding messages in innocuous media such as images, while steganalysis is the field of detecting these secret messages.  ...  Hiding a message in an image effectively decreases the probability of an image, or put another way, increases the energy of an image. We defined two energy functions for color and grayscale images.  ... 
doi:10.1145/1014052.1014117 dblp:conf/kdd/DavidsonP04 fatcat:ckc2wfurbratboq6wj44jo4r5m

Color image steganography in YCbCr space

Zena Ahmed Alwan, Hamid Mohammed Farhan, Siraj Qays Mahdi
2020 International Journal of Electrical and Computer Engineering (IJECE)  
Several systems, this one as color scale images steganography and grayscale images steganography, are used on color and store data in different techniques.  ...  This paper uses unusual module to hide data: an adaptive procedure that can increase security ranks when hiding a top secret binary image in a RGB color image, which we implement the steganography in the  ...  As the encrypted data in the 8-bit LSB does not represent the real data, which is acquired by converting the images to an alternative space and then executing an XOR.  ... 
doi:10.11591/ijece.v10i1.pp202-209 fatcat:5xcrpwi5gnaizgiwaaf5z5sypa

A Systematic Approach for Data Hiding Using Cryptography and Steganography

Kusuma Priya B
2020 International Journal of Emerging Trends in Engineering Research  
To serve data security cryptography and steganography are mainly used techniques, each of them had a problem.  ...  After that, combining the techniques of Discrete Cosine Transform (DCT) and Least Significant Bit (LSB) cryptography is utilized to mask encrypted messages inside the image.  ...  The second one is hiding the ciphertext in an image by using the merging of LSB technique and DCT technique.  ... 
doi:10.30534/ijeter/2020/63842020 fatcat:x76p4uasnzaktaeapoazmnxspa

PERFORMANCE ANALYSIS OF REVERSIBLE DATA HIDING USING AES AND HISTOGRAM SHIFTING

Nidhi Antony
2016 International Journal of Advanced Research  
Hence, the proposed method is a reliable and secure technique for reversible data hiding.  ...  As an alternative to direct embedding of data into encrypted image the proposed method encrypt the data using AES and hence provide twofold layer security.  ...  Step 3.Hide the secret data into the grayscale value of 119 and 120. Figure 3:-Histogram with minimum and maximum points This technique does not have much legroom for hiding data.  ... 
doi:10.21474/ijar01/2124 fatcat:ubydsfblsrhs3mgc4tfm2xf7q4

Orientation Modulation for Data Hiding in Chrominance Channels of Direct Binary Search Halftone Prints

Vlado Kitanovski, Marius Pedersen
2016 Final program and proceedings (Color and Imaging Conference)  
In this article, we propose a joint halftoning and data hiding technique for color images.  ...  The proposed approach uses the commonly available cyan, magenta and yellow colorants to hide data in the chrominance channels.  ...  CONCLUSION In this article, we have proposed an extension of the grayscale orientation modulation data hiding technique 23 to the high quality color direct binary search halftones.  ... 
doi:10.2352/issn.2169-2629.2017.32.32 fatcat:gcof2zu3enckpbcdivuuf57wn4

Orientation Modulation for Data Hiding in Chrominance Channels of Direct Binary Search Halftone Prints

Vlado Kitanovski, Marius Pedersen
2016 Journal of Imaging Science and Technology  
In this article, we propose a joint halftoning and data hiding technique for color images.  ...  The proposed approach uses the commonly available cyan, magenta and yellow colorants to hide data in the chrominance channels.  ...  CONCLUSION In this article, we have proposed an extension of the grayscale orientation modulation data hiding technique 23 to the high quality color direct binary search halftones.  ... 
doi:10.2352/j.imagingsci.technol.2016.60.5.050407 fatcat:lbxn2bgjhzdyla3dpowodmo3yq

LSB Steganography in Color and Grayscale Images without using the Transformation

Viji G
2011 Bonfring International Journal of Advances in Image Processing  
a large amount of payloads (image, audio, text) file into color image.  ...  A technique which enables to have a secret communication in modern technology using public channel is known as steganography This paper deals with constructing and implementing new algorithm based on hiding  ...  Employing the LSB technique for data hiding achieves both invisibility and reasonably high storage payload, a maximum of one bit per pixel (bpp) for grayscale and three bpp for Red-Green-Blue (RGB) images  ... 
doi:10.9756/bijaip.1003 fatcat:64h53pfdazcndadjp5jqmbezsm

A Comparative Study of Recent Steganography Techniques for Multiple Image Formats

Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez
2019 International Journal of Computer Network and Information Security  
Steganography is the technique for exchanging concealed secret information in a way to avoid suspicion.  ...  The aim of Steganography is to transfer secrete message to another party by hiding the data in a cover object, so that the imposter who monitors the traffic should not distinguish between genuine secret  ...  Transparency in the image allows an image to be moved or copied onto any other background image. PNG supports indexed color, grayscale and RGB.  ... 
doi:10.5815/ijcnis.2019.01.02 fatcat:d4yzymvaebcx5o7po7l52kzqwy

Image communication scheme based on dynamic visual cryptography and computer generated holography

Paulius Palevicius, Minvydas Ragulskis
2015 Optics Communications  
Dynamic visual cryptography is used both for the initial encryption of the secret image and for the final decryption.  ...  This paper proposes the integration of dynamic visual cryptography (an optical technique based on the interplay of visual cryptography and time-averaging geometric moiré) with Gerchberg-Saxton algorithm  ...  black color; 1 corresponds to the white color and all intermediate numerical values of F(x) correspond to an appropriate grayscale level.  ... 
doi:10.1016/j.optcom.2014.09.041 fatcat:xrxb7lroanal3nugsjwpzxq7ti

A Comparative Analysis of LSB, MSB and PVD Based Image Steganography

Alade Oluwaseun. Modupe, Amusan Elizabeth Adedoyin, Adedeji Oluyinka Titilayo
2021 International journal of research and review  
In this paper a comparative analysis of Least Significant Bit (LSB), Most Significant Bit (MSB) and Pixel Value Differencing (PVD) image steganography in grayscale and colored images was performed.  ...  Numerous techniques are designed to provide the security for the communication of data over the Internet.  ...  In this paper a comparative analysis of LSB, MSB and PVD based image steganography was conducted in grayscale and colored images. Three different cover images were used to hide secret message.  ... 
doi:10.52403/ijrr.20210948 fatcat:liw3dhc7pfhjnigizusu7uuwf4

Data hiding in grayscale images by dynamic programming based on a human visual model

I-Shi Lee, Wen-Hsiang Tsai
2009 Pattern Recognition  
A new method for data hiding in grayscale images based on a human vision model with distortionminimizing capabilities is proposed.  ...  Each of the eight bit planes of an input grayscale image is viewed as a binary image, into which message data are embedded horizontally.  ...  thirteen by the Chinese Image Processing and Pattern Recognition Society.  ... 
doi:10.1016/j.patcog.2009.01.014 fatcat:wsfr6o5izndfjhjcyuxtgjunq4

Chaotic Reversible Watermarking Method Based on IWT with Tamper Detection for Transferring Electronic Health Record

Mahboubeh Nazari, Arash Maneshi, Azeem Irshad
2021 Security and Communication Networks  
The proposed method has been extensively tested for various color and grayscale commonly used medical and general images.  ...  EHR is encrypted and then embedded into the Least Significant Bits (LSB) of wavelet coefficients of medical images.  ...  In this scope, researchers are looking for alternative solutions that are proper for resource-constrained IoT devices. e information hiding techniques are an adequate solution to address these challenges  ... 
doi:10.1155/2021/5514944 fatcat:ysor2orvqrdnhpcvob7tds6t5a

Reading between lines

Shuyu Shi, Lin Chen, Wenjun Hu, Marco Gruteser
2015 Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '15  
Our scheme combines existing techniques to achieve invisibility. However, we show that these techniques, when employed individually, are too constraining to deliver a high capacity.  ...  Since many codes like QR Codes are visually intrusive, various mechanisms have been explored to design visual codes that can be hidden inside regular images or videos, though the capacity of these codes  ...  BACKGROUND AND MOTIVATION Related work Hiding data and enabling communication implicitly in the environment is an important requirement for ubiquitous computing [33] .  ... 
doi:10.1145/2750858.2805824 dblp:conf/huc/ShiCHG15 fatcat:gvlsawygsnh65krfcsnqp3sxeu

New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files [article]

Hamdan.O.Alanazi, A.A.Zaidan, B.B.Zaidan, Hamid A.Jalab, Zaidoon Kh. AL-Ani
2010 arXiv   pre-print
which put the digital material for evidential purposes under question .With the large flood of information and the development of the digital format Information hiding considers one of the techniques which  ...  The main goals for this paper, provides a general overview of the New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files.  ...  Dr.Khalid Alhazmi, Dr.Abdullah Al-Afnan, Dr.Ibrahim Al-Dubaian and all the staff in king Saud University especially in Applied Medical Science In "Al-Majmah" for thier unlimited support, without thier  ... 
arXiv:1003.4084v1 fatcat:pgld7iznqfacrhgiue3xyah35e

Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding

I-Jen Lai, Wen-Hsiang Tsai
2011 IEEE Transactions on Information Forensics and Security  
The proposed method, originally designed for dealing with color images, is also extended to create grayscale mosaic images which are useful for hiding text-type grayscale document images.  ...  This effect of information hiding is useful for covert communication or secure keeping of secret images.  ...  One way for extracting the global characteristic of the color distribution of an image is the 1-D color histogram transformation technique proposed by Smith and Chang [16] .  ... 
doi:10.1109/tifs.2011.2135853 fatcat:6bfip37oirenzpxk2c6pykbgxy
« Previous Showing results 1 — 15 out of 1,341 results