نتایج جستجو برای: lsb embedding
تعداد نتایج: 74641 فیلتر نتایج به سال:
Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs) su...
Steganography is a technique used to disguise the existence of secret communication. It in many fields solve information security problems. embed data carrier image and obtain new that can't actually be distinguished from original image. This paper proposes steganography method based on least significant bit (LSB) replacement integer wavelet transform IWT through lifting scheme achieve high qua...
In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermark...
Recently, the data hiding method based on the high embedding capacity by using improved EMD method was proposed by Kuo et al.[6]. They claimed that their scheme can not only hide a great deal of secret data but also keep high safety and good image quality. However, in their scheme, the sender and the receiver must share the synchronous random secret seed before they transmit the stego-image eac...
The Internet as a whole does not use secure links, thus information in transit may be vulnerable to interruption as well. The important of reducing a chance of the information being detected during the transmission is being an issue in the real world now days. The Digital watermarking method provides for the quick and inexpensive distribution of digital information over the Internet. This metho...
In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done by decompressing the stego-image, cropping it by four pixels in both directions to remove the quantization in the freque...
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1] based on decomposition of a number (pixel-value) in sum of natural numbers. This particular representation again generates a different set of (virtual) bit-planes altogether, suitable for embedding purposes. We get more bitplanes than that we g...
Steganography is the process of hiding a secret message within a larger one in such a way that someone cannot know the presence or contents of the hidden message. The purpose of Steganography is to protect the hidden information from the outside world and the security will increase if the secret information can’t be retrieved even if the attacker has the idea of embedding method. The proposed t...
Video watermarking is extensively used in many media-oriented applications for embedding watermarks, i.e. hidden digital data, in a video sequence to protect the video from illegal copying and to identify manipulations made in the video. In case of an invisible watermark, the human eye can’t perceive any difference in the video, but a watermark extraction application can read the watermark and ...
A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors’ laboratory are introduced, including symmetric LSB embedding, secure steganography in JPEG, palette, and uncompressed color images, histogram-based analysis and least histogram abnormality steganography, multiple-base notational system based embedding, stego...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید