Variable Rate Steganography in Digital Images Using Two, Three and Four Neighbor Pixels
نویسنده
چکیده
In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedding decisions. In three neighbor method the three neighboring pixels such as upper, left and right are exploited to take embedding decisions. In four neighbor method the four neighboring pixels such as upper, left, right and bottom are exploited to take embedding decisions. The message extraction process is very simple and does not require any knowledge of the original image. The experimental results show that the distortion is less in two neighbor method as compared to the other two methods. But the theoretical studies reveal that the capacity in four neighbor method is more as compared to two and three neighbor methods.
منابع مشابه
Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image
Information transmission is increasing with grow of using WEB. So, information security has become very important. Security of data and information is the major task for scientists and political and military people. One of the most secure methods is embedding data (steganography) in different media like text, audio, digital images. This paper presents two experiments in steganography of digital...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملاستفاده از مدل جاذبه برای استخراج انحنای مرز دریاچه سد
Introduction The attraction model algorithm spatially depends on the neighborhoods of the central pixels that are attracting surrounding sub-pixels. Another possibility is the hypothesis of subpixel interaction as introduced by Mertens et al. (2003) and Atkinson (2005). In order to reach a pixel state with the maximum number of sub-pixels of identical classes neighboring, there are several met...
متن کاملCombining and Steganography of 3-D Face Textures
One of the serious issues in communication between people is hiding information from the others, and the best way for this, is to deceive them. Since nowadays face images are mostly used in three dimensional format, in this paper we are going to steganography 3-D face images and detecting which by curious people will be impossible. As in detecting face only, its texture is important, we separat...
متن کاملHiding Data in Images Using PCP
In recent years, everything is trending toward digitalization and with the rapid development of the Internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, misuse or unauthorized access of information is of great concern today which makes the protection of documents through digital media a priority problem. This urges us to devise new data hiding tec...
متن کامل