Universal stego post-processing for enhancing image steganography
نویسندگان
چکیده
منابع مشابه
Stego-Image Generator (SIG) - Building Steganography Image Database
Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to build the stegoimage database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infecte...
متن کاملImage Steganography Method to Improve the Stego Image Quality and Security using Reversible Texture Synthesis
Steganography is the profession of concealing a privacy message within a stated medium like image, audio or video. The main issue regarding every steganography technique is the changes that occur in the cover image after the data embedding procedure. We are using the source texture image for embedding privacy message in diversion with the cover image. This technique grants us to de-embedding th...
متن کاملThe Image Steganography Techniques to Improve the Security and the Stego Image Quality
Steganography is the method of hiding a secret information in a specified medium like image, video, Audio. It can be used to carry out hidden exchanges of information and to provide privacy for the user. This can be achieved by taking any multimedia as a carrier. The secret information should be embedded in the carrier medium in such a way that the attackers could not be able to find the existe...
متن کاملStego Key Estimation in LSB Steganography
There are kinds of multimedia can be accessed conveniently in social networks. Some of multimedia may be used to hiding harmful information. We consider the problem of estimating the stego key used for hiding using least significant bit (LSB) paradigm, which has been proved much difficult than detecting the hidden message. Previous framework for stego key search was provided by the theory of hy...
متن کاملChaotic iterations for steganography: Stego-security and topological-security
In this paper is proposed a novel steganographic scheme based on chaotic iterations. This research work takes place into the information hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called “watermark-only attack”. Additionally, we prove that this scheme presents topological prope...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Security and Applications
سال: 2020
ISSN: 2214-2126
DOI: 10.1016/j.jisa.2020.102664