نتایج جستجو برای: lsb embedding

تعداد نتایج: 74641  

Journal: :International Journal of Scientific Research in Science and Technology 2018

Journal: :Journal of Multimedia 2012
Yifeng Sun Danmei Niu Guangming Tang Zhanzhan Gao

This paper proposes an optimized LSB matching steganography based on Fisher Information. The embedding algorithm is designed to solve the optimization problem, in which Fisher information is the objective function and embedding transferring probabilities are variables to be optimized. Fisher information is the quadratic function of the embedding transferring probabilities, and the coefficients ...

M. Mahdavi, M. Modarres-Hashemi, N. Zaker, Sh. Samavi,

In this paper we present a new accurate steganalysis method for the LSBreplacement steganography. The suggested method is based on the changes that occur in thehistogram of an image after the embedding of data. Every pair of neighboring bins of ahistogram are either inter-related or unrelated depending on whether embedding of a bit ofdata in the image could affect both bins or not. We show that...

2014
G. Raj Kumar M. Maruthi Prasada Reddy T. Lalith Kumar

Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In steganography, there is a technique in which the least significant bit is modified to hide the secret message, known as the least significant bit (LSB) steganography. Least significant bit matching images are still not well detected, especially, at low embedding rate. In this ...

Journal: :International Journal of Electronics and Telecommunications 2023

This research proposes a method to enhance the payload message by embedding messages on dilated edge areas Least Significant Bit (LSB) method. To add security aspects messages, are not embedded directly LSB but encrypted with XOR operations Most (MSB). The experimental results of test in this study showed that dilation process some extent can increase 18.65% and average bpp is 1.42 while mainta...

Journal: :CoRR 2008
Sandipan Dey Ajith Abraham Bijoy Bandyopadhyay Sugata Sanyal

In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. The classical LSB technique is the simplest, but using this technique it is possible to embed only in first few bit-planes, since image quality becomes drastically distorted whe...

Journal: :Journal of Circuits, Systems, and Computers 2014
Bassam Jamil Mohd Thaier Hayajneh Sa'ed Abed Awni Itradat

Steganography has become an important method for concealed communication especially through image files. Recent proposed steganographic methods employ multiple levels of complex techniques. Hence, there is an increasing significance for hardware implementation and its performance metrics. The objective of this article is to analyze and model the performance of FPGA hardware implementations of s...

Journal: :Pattern Recognition 2001
Ran-Zan Wang Chi-Fang Lin Ja-Chen Lin

In this paper, we develop a novel method to embed important data in the host image so that the interceptors will not notice about the existence of the data. The basic concept of the proposed method is by simple LSB substitution. To prevent illicit access of data and increase the system performance, the method of randomized process and the optimal LSB substitution are proposed. The e!ectiveness ...

2017
M. Subbulakshmi M. Vijayaraj C. Kanmani Pappa

In this paper, the Normalized Correlation based Quantization Index Modulation (NCQIM), Least Significant Bit (LSB) and Code Division Multiple Access (CDMA) techniques are combined for reversible watermarking. By using this method, the normalized correlation is calculated between the host signal and a random signal. Then the modulation is performed on generated normalized correlation by using co...

2012
B.Ramesh Kumar Raja Krishna Kumar

Steganography is the concept of embedding information in such a way that its existence is concealed. In this paper we have shown one of the techniques used in Steganography to hide information and deliver the message to the end user using Bit-planes without any loss of data. The method used is to replace lowest 3 or 4 LSB with message bits or image data (assume 8 bit values). We do this method ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید