A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Locating secret messages in images
2004
Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '04
Typically, of the top third of one percent of most energized pixels (outliers), we find that 87% are stego-bearing in color images and 61% in grayscale images. ...
Steganography involves hiding messages in innocuous media such as images, while steganalysis is the field of detecting these secret messages. ...
Hiding a message in an image effectively decreases the probability of an image, or put another way, increases the energy of an image. We defined two energy functions for color and grayscale images. ...
doi:10.1145/1014052.1014117
dblp:conf/kdd/DavidsonP04
fatcat:ckc2wfurbratboq6wj44jo4r5m
Color image steganography in YCbCr space
2020
International Journal of Electrical and Computer Engineering (IJECE)
Several systems, this one as color scale images steganography and grayscale images steganography, are used on color and store data in different techniques. ...
This paper uses unusual module to hide data: an adaptive procedure that can increase security ranks when hiding a top secret binary image in a RGB color image, which we implement the steganography in the ...
As the encrypted data in the 8-bit LSB does not represent the real data, which is acquired by converting the images to an alternative space and then executing an XOR. ...
doi:10.11591/ijece.v10i1.pp202-209
fatcat:5xcrpwi5gnaizgiwaaf5z5sypa
A Systematic Approach for Data Hiding Using Cryptography and Steganography
2020
International Journal of Emerging Trends in Engineering Research
To serve data security cryptography and steganography are mainly used techniques, each of them had a problem. ...
After that, combining the techniques of Discrete Cosine Transform (DCT) and Least Significant Bit (LSB) cryptography is utilized to mask encrypted messages inside the image. ...
The second one is hiding the ciphertext in an image by using the merging of LSB technique and DCT technique. ...
doi:10.30534/ijeter/2020/63842020
fatcat:x76p4uasnzaktaeapoazmnxspa
PERFORMANCE ANALYSIS OF REVERSIBLE DATA HIDING USING AES AND HISTOGRAM SHIFTING
2016
International Journal of Advanced Research
Hence, the proposed method is a reliable and secure technique for reversible data hiding. ...
As an alternative to direct embedding of data into encrypted image the proposed method encrypt the data using AES and hence provide twofold layer security. ...
Step 3.Hide the secret data into the grayscale value of 119 and 120.
Figure 3:-Histogram with minimum and maximum points This technique does not have much legroom for hiding data. ...
doi:10.21474/ijar01/2124
fatcat:ubydsfblsrhs3mgc4tfm2xf7q4
Orientation Modulation for Data Hiding in Chrominance Channels of Direct Binary Search Halftone Prints
2016
Final program and proceedings (Color and Imaging Conference)
In this article, we propose a joint halftoning and data hiding technique for color images. ...
The proposed approach uses the commonly available cyan, magenta and yellow colorants to hide data in the chrominance channels. ...
CONCLUSION In this article, we have proposed an extension of the grayscale orientation modulation data hiding technique 23 to the high quality color direct binary search halftones. ...
doi:10.2352/issn.2169-2629.2017.32.32
fatcat:gcof2zu3enckpbcdivuuf57wn4
Orientation Modulation for Data Hiding in Chrominance Channels of Direct Binary Search Halftone Prints
2016
Journal of Imaging Science and Technology
In this article, we propose a joint halftoning and data hiding technique for color images. ...
The proposed approach uses the commonly available cyan, magenta and yellow colorants to hide data in the chrominance channels. ...
CONCLUSION In this article, we have proposed an extension of the grayscale orientation modulation data hiding technique 23 to the high quality color direct binary search halftones. ...
doi:10.2352/j.imagingsci.technol.2016.60.5.050407
fatcat:lbxn2bgjhzdyla3dpowodmo3yq
LSB Steganography in Color and Grayscale Images without using the Transformation
2011
Bonfring International Journal of Advances in Image Processing
a large amount of payloads (image, audio, text) file into color image. ...
A technique which enables to have a secret communication in modern technology using public channel is known as steganography This paper deals with constructing and implementing new algorithm based on hiding ...
Employing the LSB technique for data hiding achieves both invisibility and reasonably high storage payload, a maximum of one bit per pixel (bpp) for grayscale and three bpp for Red-Green-Blue (RGB) images ...
doi:10.9756/bijaip.1003
fatcat:64h53pfdazcndadjp5jqmbezsm
A Comparative Study of Recent Steganography Techniques for Multiple Image Formats
2019
International Journal of Computer Network and Information Security
Steganography is the technique for exchanging concealed secret information in a way to avoid suspicion. ...
The aim of Steganography is to transfer secrete message to another party by hiding the data in a cover object, so that the imposter who monitors the traffic should not distinguish between genuine secret ...
Transparency in the image allows an image to be moved or copied onto any other background image. PNG supports indexed color, grayscale and RGB. ...
doi:10.5815/ijcnis.2019.01.02
fatcat:d4yzymvaebcx5o7po7l52kzqwy
Image communication scheme based on dynamic visual cryptography and computer generated holography
2015
Optics Communications
Dynamic visual cryptography is used both for the initial encryption of the secret image and for the final decryption. ...
This paper proposes the integration of dynamic visual cryptography (an optical technique based on the interplay of visual cryptography and time-averaging geometric moiré) with Gerchberg-Saxton algorithm ...
black color; 1 corresponds to the white color and all intermediate numerical values of F(x) correspond to an appropriate grayscale level. ...
doi:10.1016/j.optcom.2014.09.041
fatcat:xrxb7lroanal3nugsjwpzxq7ti
A Comparative Analysis of LSB, MSB and PVD Based Image Steganography
2021
International journal of research and review
In this paper a comparative analysis of Least Significant Bit (LSB), Most Significant Bit (MSB) and Pixel Value Differencing (PVD) image steganography in grayscale and colored images was performed. ...
Numerous techniques are designed to provide the security for the communication of data over the Internet. ...
In this paper a comparative analysis of LSB, MSB and PVD based image steganography was conducted in grayscale and colored images. Three different cover images were used to hide secret message. ...
doi:10.52403/ijrr.20210948
fatcat:liw3dhc7pfhjnigizusu7uuwf4
Data hiding in grayscale images by dynamic programming based on a human visual model
2009
Pattern Recognition
A new method for data hiding in grayscale images based on a human vision model with distortionminimizing capabilities is proposed. ...
Each of the eight bit planes of an input grayscale image is viewed as a binary image, into which message data are embedded horizontally. ...
thirteen by the Chinese Image Processing and Pattern Recognition Society. ...
doi:10.1016/j.patcog.2009.01.014
fatcat:wsfr6o5izndfjhjcyuxtgjunq4
Chaotic Reversible Watermarking Method Based on IWT with Tamper Detection for Transferring Electronic Health Record
2021
Security and Communication Networks
The proposed method has been extensively tested for various color and grayscale commonly used medical and general images. ...
EHR is encrypted and then embedded into the Least Significant Bits (LSB) of wavelet coefficients of medical images. ...
In this scope, researchers are looking for alternative solutions that are proper for resource-constrained IoT devices. e information hiding techniques are an adequate solution to address these challenges ...
doi:10.1155/2021/5514944
fatcat:ysor2orvqrdnhpcvob7tds6t5a
Reading between lines
2015
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '15
Our scheme combines existing techniques to achieve invisibility. However, we show that these techniques, when employed individually, are too constraining to deliver a high capacity. ...
Since many codes like QR Codes are visually intrusive, various mechanisms have been explored to design visual codes that can be hidden inside regular images or videos, though the capacity of these codes ...
BACKGROUND AND MOTIVATION Related work Hiding data and enabling communication implicitly in the environment is an important requirement for ubiquitous computing [33] . ...
doi:10.1145/2750858.2805824
dblp:conf/huc/ShiCHG15
fatcat:gvlsawygsnh65krfcsnqp3sxeu
New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files
[article]
2010
arXiv
pre-print
which put the digital material for evidential purposes under question .With the large flood of information and the development of the digital format Information hiding considers one of the techniques which ...
The main goals for this paper, provides a general overview of the New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files. ...
Dr.Khalid Alhazmi, Dr.Abdullah Al-Afnan, Dr.Ibrahim Al-Dubaian and all the staff in king Saud University especially in Applied Medical Science In "Al-Majmah" for thier unlimited support, without thier ...
arXiv:1003.4084v1
fatcat:pgld7iznqfacrhgiue3xyah35e
Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding
2011
IEEE Transactions on Information Forensics and Security
The proposed method, originally designed for dealing with color images, is also extended to create grayscale mosaic images which are useful for hiding text-type grayscale document images. ...
This effect of information hiding is useful for covert communication or secure keeping of secret images. ...
One way for extracting the global characteristic of the color distribution of an image is the 1-D color histogram transformation technique proposed by Smith and Chang [16] . ...
doi:10.1109/tifs.2011.2135853
fatcat:6bfip37oirenzpxk2c6pykbgxy
« Previous
Showing results 1 — 15 out of 1,341 results