User Interface Based High Payload Double Image Steganography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Based Steganography Methods With High Payload

There is a lot of research going on to find a stenography technique which is not only imperceptible but also has other two features, namely, high embedding capacity and robustness. Imperceptibility is the most important requirement of steganography followed by high capacity. In this paper we give an overview of high capacity image steganographic techniques and propose a novel imperceptible and ...

متن کامل

Steganography Based on Payload Transformation

Steganography is meant for covert communication of confidential data through internet. In this paper, we propose Steganography based on Payload Transformation (SPT) which is non LSB and non transform domain technique where the cover image is segmented into 2*2 matrices and the matrix for payload embedding is considered based on the threshold value fixed by computing adjacent pixel intensity dif...

متن کامل

Wavelet based Secure Steganography with Scrambled Payload

The Steganography is used for secure communication of information by embedding information in a cover object. In this paper we propose Wavelet based Secure Steganography with Scrambled Payload (WSSSP). The Daubechies Lifting Wavelet Transform (LWT) is applied on cover image. The XD band is decomposed into upper and lower bands for payload embedding. The payload is segmented into four equal bloc...

متن کامل

High payload steganography mechanism using hybrid edge detector

Keywords: LSB steganography Stego-image Image steganalysis Hybrid edge detection a b s t r a c t Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret ...

متن کامل

Location-Based Image Steganography

The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages. The chi square (χ 2 ) attack and regular-singular (RS) attack are two well recognized and widely applied statistical steganalysis schem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2018

ISSN: 2319-5940,2278-1021

DOI: 10.17148/ijarcce.2018.71220