نتایج جستجو برای: lsb embedding
تعداد نتایج: 74641 فیلتر نتایج به سال:
This project proposes method for image encryption and decryption, data embedding and data extraction. The content owner first encrypts image by BB equation and chaos algorithm, then the data is encrypted using data hiding key and embedded into LSB bit of specific pixels. With an encrypted image containing additional data, if a receiver has the data-hiding key, the data can be extracted without ...
----------------------------------------------------------------------ABSTRACT-------------------------------------------------------------Steganography is derived from the Greek word steganos which literally means “Covered” and graphy means “Writing”, i.e. covered writing. Steganography refers to the science of “invisible” communication. For hiding secret information in various file formats, t...
Digital images can be copied without authorization and have to be protected. Two schemes for watermarking images in PDF document were considered. Both schemes include a converter to extract images from PDF pages and return the protected images back. Frequency and spatial domain embedding were used for hiding a message presented by a binary pattern. We considered visible and invisible watermarki...
Abstract— In this paper we present a comparative study of four different image steganography algorithms based on orthogonal Haar Wavelet Transform and biorthogonal CDF9/7 Transform. One can divide the steganography techniques into two categories: Reversible techniques and Irreversible techniques. There are applications such as medical image system and law enforcement where it is desirable to re...
This paper presents a novel approach of building a secure data hiding technique in digital images. The image steganography technique takes the advantage of limited power of human visual system (HVS). It uses image as cover media for embedding secret message. The most important requirement for a steganographic algorithm is to be imperceptible while maximizing the size of the payload. In this pap...
In this paper, we propose a new algorithm of steganography to allow simultaneous hiding secret message and small-size image into an large-size image. To hide the secret message in small image we use the Least Significant Bit (LSB) substitution, and the method for hiding the image in the image cover use Discrete Wavelet Transformation (DWT). The proposed method results in increasing the secret m...
A steganographic method called adjacent bin mapping (ABM) is presented. Firstly, it is applied to 3D geometries by mapping the coordinates within two adjacent bins for data embedding. When applied to digital images, it becomes a kind of LSB hiding, namely the LSB algorithm. In order to prevent the detection using a metric named histogram tail, the hiding is performed in a pseudorandom order. Th...
We present a generalised and improved version of the category attack on LSB steganography in JPEG images with straddled embedding path. It detects more reliably low embedding rates and is also less disturbed by double compressed images. The proposed methods are evaluated on several thousand images. The results are compared to both recent blind and specific attacks for JPEG embedding. The propos...
LSB steganography is a one of the most widely used methods for implementing covert data channels in image file exchanges [1][2]. The low computational complexity and implementation simplicity of the algorithm are significant factors for its popularity with the primary reason being low image distortion. Many attempts have been made to increase the embedding capacity of LSB algorithms by expandin...
An improved method for embedding a secret message into a cover image with least significant bit (LSB) substitution in discrete cosine transformation (DCT) domain was proposed. The secret message was first split into partitions, while the cover image was divided into blocks of size 2x2, and DCT was used to convert the blocks from spatial domain to frequency domain. Then, Particle Swarm Optimizat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید