1,137 Hits in 5.5 sec

Voicing of animated GIF by data hiding

Sonia Djaziri-Larbi, Awatef Zaien, Sylvie Sevestre-Ghalila
2015 Multimedia tools and applications  
The embedding process is a low complexity, luminance based steganography algorithm, that slightly modifies the pixels colors of the GIF images to insert the sound bits.  ...  The cover images have undergone objective 2 Sonia Djaziri-Larbi et al. quality criteria and informal subjective evaluation and has proved to be of good quality.  ...  Appendix: Pseudo codes This appendix gives basic pseudo codes of the voicing algorithm: the main code and the Function of Fridrich steganography method in the case where a bit is embedded in each pixel  ... 
doi:10.1007/s11042-015-2491-y fatcat:zqf6insr4rfe5ahr4be5hje66a

Image Steganography in Spatial Domain: Current Status, Techniques, and Trends

Adeeb M. Alhomoud
2021 Intelligent Automation and Soft Computing  
Currently, image steganography is the most developed field, with several techniques are provided for different image formats.  ...  Furthermore, to aid the steganography researchers in developing efficient spatial-domain embedding techniques, the future research of the spatial-domain steganography is discussed and a set of recommendations  ...  In palette-based steganography, the colour that has a similar parity of a secret bit within a palette is used for the embedding procedure.  ... 
doi:10.32604/iasc.2021.014773 fatcat:brkq663abvdxxaqr4sm4a46z6e

A Review on Steganalysis Techniques: From Image Format Point of View

Sherif MBadr, Goada Ismaial, Ashgan H. Khalil
2014 International Journal of Computer Applications  
Steganalysis is the art and science of detecting the embedded message in a multimedia document, this document may be text, image, audio or video.  ...  Many studies focus on review the steganalysis algorithm based on steganography and steganalysis classification.  ...  PNG supports three main image types: true color, gray scale and palette-based (``8-bit'').  ... 
doi:10.5120/17802-8617 fatcat:7qrsdifxvfdlzh6rqtdyjpxr34

A Survey on Digital Image Steganography and Steganalysis

Gangadhar Tiwari
2013 IOSR Journal of Electronics and Communication Engineering  
The cover files may be any digital data including Image or Audio files. For steganography several methods exists where each of them has some advantages and disadvantages.  ...  In this paper we present an overview of image steganography and steganalsysis, its uses and techniques.  ...  Based on Embedding Domain There are number of image steganography algorithm proposed on the basis of embedding domain that includes Spatial or Transform, depending on redundancies used from domain for  ... 
doi:10.9790/2834-0815660 fatcat:6zksruhnh5h2blon4eg5yjcxkq

Encryption and Authentication of Effigy by using SVD

Komal Gaikwad
2019 International Journal for Research in Applied Science and Engineering Technology  
Decryption of Image VI. CONCLUSION This system usage SVD algorithm for encryption and gain better quality of image.  ...  The RDH (Reversible Data Hiding) approach is intended for grayscales images previously and it cannot be directly applied to the palette image.  ...  INTRODUCTION In this system, proposed a reliable SRDH scheme for encrypted palette images.  ... 
doi:10.22214/ijraset.2019.5396 fatcat:eh4ge4dfwresvgs3bewu7rwbsm

Conditional Entrench Spatial Domain Steganography

Sathisha N, Madhusudan G N, Suresh Babu K, Raja K B, Venugopal K R
2014 Signal & Image Processing An International Journal  
The first block of cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving payload at the destination.  ...  In this paper, we propose a spatial domain steganography method for embedding secret information on conditional basis using 1-Bit of Most Significant Bit (MSB).  ...  RELATED WORK Rong Jian Chen et al., [1] presented a multi bit and multi-image steganography system using adaptive embedding algorithms with minimum error.  ... 
doi:10.5121/sipij.2014.5303 fatcat:apdm3wvzqne3tdy76cutxr3xhy

Steganographic Techniques of Data Hiding Using Digital Images (Review Paper)

Babloo Saha, Shuchi Sharma
2012 Defence Science Journal  
For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons.  ...  Steganography's goal is to hide the very existence of embedded data so as not to arouse an eavesdropper's suspicion.  ...  It is based on the simple idea that the higher bit planes can also be used for embedding information. In BPCS, each block is decomposed into bit-plane.  ... 
doi:10.14429/dsj.62.1436 fatcat:jg3opahcgnf5rm4yblbwno45ty

Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique

Jawaher alqahtani, Daniyal Alghazzawi, Li Cheng
2016 International journal of network security and its applications  
However the efficiency and performance of previous approaches still have room for improvement.  ...  In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files.  ...  Daniyal Alghazzawi, for supporting me and providing me with guidance and all the necessary facilities for the completion of this work.  ... 
doi:10.5121/ijnsa.2016.8501 fatcat:uxsmxqslkfdj5jbqeebika3tru

An Animated GIF Steganography Using Variable Block Partition Scheme

Maram Abdullah M. Alyahya, Arshiya S. Ansari, Mohammad Sajid Mohammadi
2022 Computer systems science and engineering  
Then algorithm embeds secret data on appropriate pixel of the (GIF) frame. Each selected partition block for data embedding, can store a different number of data bits based on block size.  ...  The algorithm estimates the capacity of the cover (GIF) image frames to embed data bits.  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/csse.2022.023904 fatcat:tu7wa2zt2jgtrkor7gjzetjcuy

Subject Review: Information Steganography Based on Different Methods

Amal Abdulbaqi Maryoosh, Zahraa Salah Dhaief, Raniah Ali Mustafa
2021 International Journal of Advances in Scientific Research and Engineering  
The major aim of this work is reviewing and describing many approaches utilized for hiding data within multimedia and to create a comparison of these methods.  ...  Data security may depend on the type of hiding algorithm used and sometimes encryption is used in conjunction with hiding to increase data security.  ...  STC) model, the new cost assignment algorithm based on dynamic GIF image properties, which include image palette and inter-frame associations.  ... 
doi:10.31695/ijasre.2021.33985 fatcat:oktgtricxvfxdf7uv4jnwknfz4

Reversible Image Processing using 'Magical Triangle'

Mariyan Richard A., Lakshmi Narayan B.N., Prasad N. Hamsavath
2021 International Journal of Computer Applications  
The payload is to calculate the pixels values on reversible data hiding, we converting the image pixels into a value. Generating the matrix form is converting an image using matrix algorithm.  ...  The original images were converted in to a reversible matrix values by discovery, the values of the pixels using payload technique.  ...  Fig.1 Properties of DH The embedded information cannot be viewed except a secret key for the hidden images.  ... 
doi:10.5120/ijca2021921011 fatcat:cnd2snazavhhvjarmppo4u4j7a

An overview of steganography techniques applied to the protection of biometric data

Mandy Douglas, Karen Bailey, Mark Leeney, Kevin Curran
2017 Multimedia tools and applications  
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of music, video or image files, whilst steganography is the art of hiding information.  ...  Techniques such as watermarking and steganography have been used in attempt to improve security of biometric data.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (, which permits unrestricted use, distribution  ... 
doi:10.1007/s11042-017-5308-3 fatcat:34lpiqcktrhnxazxmfsmqw6afe

Approaches and Methods for Steganalysis – A Survey

Rathika L, Loganathan B
2017 IJARCCE  
The counter technique of image steganography is called as image steganalysis, which begins by recognizing the object that exists in the embedded source file.  ...  Information security is the main concern of current scenario, which has a number of approaches to preserve data via cryptography, watermarking, steganography techniques.  ...  This approach is well suited for the embedding archetype that randomly embeds messages in LSBs of indices to palette colors of palette image.  ... 
doi:10.17148/ijarcce.2017.6678 fatcat:w6ridb6b6ba7vdah7yd3ohrcvm

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Mohammed J. Bawaneh, Atef A. Obeidat
2016 Journal of Information Security  
Also it achieved the maximum capacity of cover image with a modification rate equals 0.04 and visual quality for stego-image comparable to cover image.  ...  There are a lot of methods that were utilized for building the steganography; such as LSB (Least Significant Bits), Discrete Cosine Transform (DCT), Discrete Fourier Transform, Spread-Spectrum Encoding  ...  It used the cover-image and text files representation in a given array that takes the alteration component based approach and the method of Palette Based Images.  ... 
doi:10.4236/jis.2016.73011 fatcat:x7347dj43zefxjaboarosqkw3q

Transplant Image Processing Technology under Windows into the Platform Based on MiniGUI

Lan Gan, Xu Zhang, Wenya Lv, Jia Yu
2012 Physics Procedia  
Therefore, this paper draws on the experience of image processing technology of Windows and transplants it into MiniGUI embedded systems.  ...  But in embedded systems, image processing technology dues to the restrictions of hardware and software do not have the environment of MFC in Windows.  ...  The system can be customized as needed to improve medical image analysis for embedded, mobile photo processing, PDA picture browsing and handling, satellite tracking and other image capture applications  ... 
doi:10.1016/j.phpro.2012.05.134 fatcat:34mepkhdqfehtap3xujdlkym2a
« Previous Showing results 1 — 15 out of 1,137 results