User Interface Based High Payload Double Image Steganography
نویسندگان
چکیده
منابع مشابه
Image Based Steganography Methods With High Payload
There is a lot of research going on to find a stenography technique which is not only imperceptible but also has other two features, namely, high embedding capacity and robustness. Imperceptibility is the most important requirement of steganography followed by high capacity. In this paper we give an overview of high capacity image steganographic techniques and propose a novel imperceptible and ...
متن کاملSteganography Based on Payload Transformation
Steganography is meant for covert communication of confidential data through internet. In this paper, we propose Steganography based on Payload Transformation (SPT) which is non LSB and non transform domain technique where the cover image is segmented into 2*2 matrices and the matrix for payload embedding is considered based on the threshold value fixed by computing adjacent pixel intensity dif...
متن کاملWavelet based Secure Steganography with Scrambled Payload
The Steganography is used for secure communication of information by embedding information in a cover object. In this paper we propose Wavelet based Secure Steganography with Scrambled Payload (WSSSP). The Daubechies Lifting Wavelet Transform (LWT) is applied on cover image. The XD band is decomposed into upper and lower bands for payload embedding. The payload is segmented into four equal bloc...
متن کاملHigh payload steganography mechanism using hybrid edge detector
Keywords: LSB steganography Stego-image Image steganalysis Hybrid edge detection a b s t r a c t Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret ...
متن کاملLocation-Based Image Steganography
The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages. The chi square (χ 2 ) attack and regular-singular (RS) attack are two well recognized and widely applied statistical steganalysis schem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2018
ISSN: 2319-5940,2278-1021
DOI: 10.17148/ijarcce.2018.71220