Variable Rate Steganography in Digital Images Using Two, Three and Four Neighbor Pixels

نویسنده

  • Anita Pradhan
چکیده

In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedding decisions. In three neighbor method the three neighboring pixels such as upper, left and right are exploited to take embedding decisions. In four neighbor method the four neighboring pixels such as upper, left, right and bottom are exploited to take embedding decisions. The message extraction process is very simple and does not require any knowledge of the original image. The experimental results show that the distortion is less in two neighbor method as compared to the other two methods. But the theoretical studies reveal that the capacity in four neighbor method is more as compared to two and three neighbor methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image

Information transmission is increasing with grow of using WEB. So, information security has become very important. Security of data and information is the major task for scientists and political and military people. One of the most secure methods is embedding data (steganography) in different media like text, audio, digital images. This paper presents two experiments in steganography of digital...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

استفاده از مدل جاذبه برای استخراج انحنای مرز دریاچه سد

Introduction The attraction model algorithm spatially depends on the neighborhoods of the central pixels that are attracting surrounding sub-pixels. Another possibility is the hypothesis of subpixel interaction as introduced by Mertens et al. (2003) and Atkinson (2005). In order to reach a pixel state with the maximum number of sub-pixels of identical classes neighboring, there are several met...

متن کامل

Combining and Steganography of 3-D Face Textures

One of the serious issues in communication between people is hiding information from the others, and the best way for this, is to deceive them. Since nowadays face images are mostly used in three dimensional format, in this paper we are going to steganography 3-D face images and detecting which by curious people will be impossible. As in detecting face only, its texture is important, we separat...

متن کامل

Hiding Data in Images Using PCP

In recent years, everything is trending toward digitalization and with the rapid development of the Internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, misuse or unauthorized access of information is of great concern today which makes the protection of documents through digital media a priority problem. This urges us to devise new data hiding tec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012