نتایج جستجو برای: lsb embedding
تعداد نتایج: 74641 فیلتر نتایج به سال:
One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or truncation at the grayscales 0 and 255. Although the distortion is often quite small and perceptual models are used to minimize its visibility,...
This study proposes a new hybrid n-LSB (Least Significant Bit) substitution-based image steganography method in the spatial plane. The previously proposed substitution by authors of this paper is combined with Rivest-Shamir-Adleman (RSA), RC5, and Data Encryption Standard (DES) encryption algorithms to improve security steganography, which one requirements Lempel-Ziv-Welch (LZW), Arithmetic Def...
Using data hiding technique one can send the information to the accurate user without noticing to third person. Data can be hidden using different cover Medias, like video, audio, images or text. As an Internet based communications of images have increased, encryption of images has become very important way to protect images especially on the Internet. This work proposes a new scheme for hiding...
Steganography and cryptography methods are used together with wavelets to increase the security of the data while transmitting through networks. In the discrete wavelet transform, an image signal can be analyzed by passing it through an analysis filter bank. This analysis filter bank consists of a low pass and a high pass filter at each decomposition stage. Another technology, the digital water...
In this paper, we propose a chaos-based enhancement of two spatial steganographic algorithms; the AE-LSB and the EA-LSBMR and our objective is to study their performances. The first algorithm is an adaptive LSB (Least Significant Bit) steganographic method using pixel value difference that provides a large embedding capacity and imperceptible stego images. The second method is an edge adaptive ...
We consider here the class of probability mass-function (PMF) based detectors of least significant bit (LSB) embedded steganography. That is, in this paper we investigate the use of frequency counts of pixel intensities as a statistic for tests detecting the presence of hidden messages. We focus on LSB replacement (though we briefly consider LSB matching) embedding as it is a simple technique w...
Steganography is the art of hiding information in a cover medium such that the existence of information is concealed. An image is a suitable cover medium for steganography because of its great amount of redundant spaces. One simple method of image steganography is the replacement of the least significant bit (LSB) of a cover image with a message bit. This represents a high embedding capacity bu...
Data hiding is referred as a process of hiding a data into a cover medium. Also the process works with two links one is with a set of embedding of additional data and another one is with a set of the cover data. The relationship between these two sets of data is characterized for different applications. For instance, in some communications, the hidden data may often be irrelevant to the cover m...
The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most impo...
In this paper, a novel two-dimensional Discrete Fourier Transform based information embedding has been proposed for color image authentication (2D-DFTSDECIA). Initially, each 2 × 2 sub-image block of the carrier image is pre-adjusted, if necessary and then transformed by the application of two dimensional Discrete Fourier Transforms (2D-DFT) where the transformation technique has been applied i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید