منابع مشابه
Image Steganography
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all...
متن کاملImage Steganography: A Review
One of the reasons that attackers are being successful is that most of the information they acquire from a system is in a form that they can read and access easily. Attackers may then reveal, modify or misuse the information. One of the solutions to this problem is, through the use of steganography. In this paper, we’ll discuss an overview of Image steganography, its uses and techniques. We’ll ...
متن کاملImage steganography and steganalysis
Image steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today’s digital world where information is often and easily exchanged through...
متن کاملSpread spectrum image steganography
In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a messa...
متن کاملLocation-Based Image Steganography
The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages. The chi square (χ 2 ) attack and regular-singular (RS) attack are two well recognized and widely applied statistical steganalysis schem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Image Processing
سال: 2005
ISSN: 1057-7149
DOI: 10.1109/tip.2005.859370