Universal stego post-processing for enhancing image steganography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stego-Image Generator (SIG) - Building Steganography Image Database

Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to build the stegoimage database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infecte...

متن کامل

Image Steganography Method to Improve the Stego Image Quality and Security using Reversible Texture Synthesis

Steganography is the profession of concealing a privacy message within a stated medium like image, audio or video. The main issue regarding every steganography technique is the changes that occur in the cover image after the data embedding procedure. We are using the source texture image for embedding privacy message in diversion with the cover image. This technique grants us to de-embedding th...

متن کامل

The Image Steganography Techniques to Improve the Security and the Stego Image Quality

Steganography is the method of hiding a secret information in a specified medium like image, video, Audio. It can be used to carry out hidden exchanges of information and to provide privacy for the user. This can be achieved by taking any multimedia as a carrier. The secret information should be embedded in the carrier medium in such a way that the attackers could not be able to find the existe...

متن کامل

Stego Key Estimation in LSB Steganography

There are kinds of multimedia can be accessed conveniently in social networks. Some of multimedia may be used to hiding harmful information. We consider the problem of estimating the stego key used for hiding using least significant bit (LSB) paradigm, which has been proved much difficult than detecting the hidden message. Previous framework for stego key search was provided by the theory of hy...

متن کامل

Chaotic iterations for steganography: Stego-security and topological-security

In this paper is proposed a novel steganographic scheme based on chaotic iterations. This research work takes place into the information hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called “watermark-only attack”. Additionally, we prove that this scheme presents topological prope...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security and Applications

سال: 2020

ISSN: 2214-2126

DOI: 10.1016/j.jisa.2020.102664