47,573 Hits in 7.7 sec

Detection of Hiding in the Least Significant Bit

O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath
2004 IEEE Transactions on Signal Processing  
In this paper, we apply the theory of hypothesis testing to the steganalysis, or detection of hidden data, in the least significant bit (LSB) of a host image.  ...  These are shown to be superior to the state of the art in terms of receiver operating characteristics as well as self-calibration across different host images.  ...  ACKNOWLEDGMENT The authors are thankful to the reviewers for their careful reading and detailed comments.  ... 
doi:10.1109/tsp.2004.833869 fatcat:deh63e6p7bcv5ftuy6ahihazra

Data Hiding Using Least Significant Bit Steganography In Digital Images

B.Chitradevi, N.Thinaharan, M.Vasanthi
2017 Zenodo  
This paper presents a brief idea about the image steganography that make use of Least Significant Bit (LSB) algorithm for hiding the data into an image.  ...  This is accomplished in the course of hiding information in another information, therefore hiding the existence of the communicated information.  ...  Least Significant Bit (LSB) In Steganography, The most well known techniques to data hiding in images are least significant bit (LSB) substitution, and masking & filtering techniques.  ... 
doi:10.5281/zenodo.262996 fatcat:gfkin2qrljdwrowcz77apeypee

Information Trouncing Via Slightest Momentous Spot System Procedure

D Saravanan, N Sivaprasad, Dennis Joseph
2018 International Journal of Engineering & Technology  
The least-significant-bit based approach is a popular type of stenographic algorithms in the spatial domain.  ...  In this paper, we expand the least significant bit matching revisited audio stegnography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message  ...  We consider the problem of detecting spatial domain least significant bit matching steganography in grayscale images, which has proved much harder than for its counterpart, least significant bit replacement  ... 
doi:10.14419/ijet.v7i3.27.18002 fatcat:o4mxg4vxzbdwvcp3x7kwwd2tza

Comparison of Information Hiding by LSB Using Arithmetical Sequence on different image Format

Bassam Hasan Saghir, Elsamani Abd Elmutalib Ahmed, Abdelmajid H. Mansour, Gafar Zen A. Salh
2015 IJARCCE  
The aim of this paper is to compare the hiding of information in images by the least significant bit "LSB".  ...  of Information hiding exist for the securing process.  ...  LEAST SIGNIFICANT BIT (LSB) CODING A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of  ... 
doi:10.17148/ijarcce.2015.44133 fatcat:eztv6x6kxvghvgwi2uubj4ncde

An Improved LSB Based Steganography Technique for RGB Color Images

Mamta Juneja, Parvinder S. Sandhu
2013 International Journal of Computer and Communication Engineering  
Message bits are then, embedded in the least significant byte of randomly selected edge area pixels and 1-3-4 LSBs of red, green, blue components respectively across randomly selected pixels across smooth  ...  This paper proposes an improved LSB(least Significant bit) based Steganography technique for images imparting better information security .It presents an embedding algorithm for hiding encrypted messages  ...  of Red component (Most significant byte),3-bits in 3 least significant bits of Green component and 4 bits in 4 least significant bits of Blue component(Least significant byte) of each selected pixel .  ... 
doi:10.7763/ijcce.2013.v2.238 fatcat:6htjcrnctze6bb2jbyp4h7ofem

An Enhanced Method for Least Significant Bit Image Steganography using Discrete Logarithmic Dispersion Strategy

Sreeparna Ganguly, Pranati Rakshit
2016 International Journal of Computer Applications  
This work intends to give an overview of image steganography, its uses and techniques. The proposed method uses the LSB (Least Significant Bit) technique to hide information in the cover image.  ...  The system enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for unauthorized people to extract the original image.  ...  This paper focuses on the Least Significant Bit (LSB) technique in hiding messages in an image.  ... 
doi:10.5120/ijca2016909943 fatcat:oddxj6i45bfxrdked6n3jnn6xy


Roja Ramani.A, P.V.S. Srinivas
2013 International Journal of Computer Applications Technology and Research  
C.LSB algorithm LSB (Least Significant Bit) substitution is the process of adjusting the least significant bit pixels of the carrier image.  ...  For an 8 bit image, the least significant bit i.e., the 8 th bit of each byte of the image is changed to the bit of secret message [10] .  ... 
doi:10.7753/ijcatr0205.1011 fatcat:ebq3ujctrjgmrdsnwixl52wmu4

A Review on Various Approaches for Data Hiding

2016 International Journal of Science and Research (IJSR)  
The art and science of hiding information by embedding messages within other, seemingly harmless messages.  ...  Steganography works by replacing bits of useless or unused datain regular computer files (such as graphics, sound, text or even floppy disks ) with bits of different, invisible information.  ...  In this process image is divided into different regions for the detection of least significant bits available in different images.  ... 
doi:10.21275/v5i1.nov152811 fatcat:4e7ncr6o3jgc7elwrvffmq7dd4

Proposed Method of Text Hiding in Image Edges

Nasseer M., Ashty M., Dhafer J.
2015 International Journal of Computer Applications  
a cover images using Least Significant Bit (LSB) based Sobel edge detection algorithm.  ...  This work shows how the edges of the images will be detected by scanning method using 3x3 window and then the secret message is canceled in edges of a gray scale images (Lena and goldhill) which acts as  ...  Aaref for bestowing on me the opportunity to undergo my thesis work under his guidance. I am also thankful to the authors whose works I have consulted and quoted in this work.  ... 
doi:10.5120/ijca2015906225 fatcat:jfm7cw6omzf5revabae4e6ofjm

An Efficient and Secure Data Hiding Technique – Steganography

Abhilasha Ramdas Bhagat, A. Prof. Ashish B Dhembhare
2015 International Journal of Innovative Research in Computer and Communication Engineering  
The propose of a framework for the detection of the least significant bit (LSB) steganography with the use of digital media files as cover objects.  ...  In the traditional steganography techniques principle was either to replace a certain part of the frequency components of the carrier image, or to replace all the least significant bits of a multi-valued  ...  The least significant bit (in other words, the 8th bit) of the bytes inside an image is changed to a bit of the secret message.  ... 
doi:10.15680/ijircce.2015.0302034 fatcat:6b5lg2oxrna3fphhykycolwt34

A Dynamic Rgb Intensity Based Steganography Scheme

Mandep Kaur, Surbhi Gupta, Parvinder S. Sandhu, Jagdeep Kaur
2010 Zenodo  
The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond  ...  Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message.  ...  The four least significant bits of one of the channel will be used as an indication to the existence of hidden data in other two channels as follow: The least two significant bits [4] of one of the channel  ... 
doi:10.5281/zenodo.1080791 fatcat:pqtjbntq2jf35m3ny52sp6b3cu

Image complexity and feature mining for steganalysis of least significant bit matching steganography

Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Mingzhen Wei, Zhongxue Chen, Jianyun Xu
2008 Information Sciences  
In addition, we also present a scheme of steganalysis of least significant bit (LSB) matching steganography, based on feature mining and pattern recognition techniques.  ...  Results also indicate that the significance of features and the detection performance depend not only on the information-hiding ratio, but also on the image complexity.  ...  The authors acknowledge Farid, Lyu, Simoncelli and Harmsen for offering us their codes. We thank the reviewers for their insightful comments and helpful suggestions.  ... 
doi:10.1016/j.ins.2007.08.007 fatcat:3sdenxbiffcdxpet6lkdipb7j4

A Proposed Algorithm For Steganography In Digital Image Based on Least Significant Bit

Ahmed BD, A. E. Mustafa, A.M.F. ElGamal, M.E. ElAlmi
2011 مجلة بحوث التربية النوعية  
step : Replace the least significant bit by one bit of the data to be hidden.  ...  A Proposed Algorithm For Steganography In Digital Image Based on Least Significant Bit Introduction The hiding of data is frequently called steganography .Steganography is a technology that hides a message  ... 
doi:10.21608/mbse.2011.145167 fatcat:lsdsg7irgzfyrmat42cvtv33oa

Embedding Data in Audio and Image Processing by Steganographic Tool Techniques

K. Shanthi, K. Abhishek
2015 International Journal of Engineering Research and  
In modern communication system, data hiding is most essential for Network Security issue. Steganography means the ability of hiding the information in all the way.  ...  Itis an art of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of the secret messages.The goal of steganography is different from classical  ...  By replacing the least significant bit in each of these color values, it is possible to hide a secret message, bit by bit, without changing the color values too much, as illustrated in Example 1.  ... 
doi:10.17577/ijertv4is030759 fatcat:dh4ozq7gozc3nnty2fc3orjilq

Image Analysis for Online Dynamic Steganography Detection

Kevin Curran, Joanne Mc Devitt
2008 Computer and Information Science  
With this in mind there is a need to detect hidden data using Steganalysis -the art of detecting messages using Steganography.  ...  In recent years there has been a noticeable growth in the quantity of available Steganography tools on the World Wide Web.  ...  Hide and Seek conceals data in the GIF files using the least significant bit of each data byte to encode characters.  ... 
doi:10.5539/cis.v1n3p32 fatcat:i3oerf2ndjeitnc3avbwnggepa
« Previous Showing results 1 — 15 out of 47,573 results