Academic literature on the topic 'COLOR IMAGE STEGANOGRAPHY'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COLOR IMAGE STEGANOGRAPHY.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "COLOR IMAGE STEGANOGRAPHY"
Xu, Meng, Xiangyang Luo, Jinwei Wang, and Hao Wang. "Color image steganalysis based on quaternion discrete cosine transform." Electronic Research Archive 31, no. 7 (2023): 4102–18. http://dx.doi.org/10.3934/era.2023209.
Full textSundos A. Hameed Al-azawi and Abbas A. AbulHameed. "Information Hiding in Color Image Using Steganographic technique." Journal of the College of Basic Education 17, no. 70 (December 22, 2022): 113–22. http://dx.doi.org/10.35950/cbej.vi.8480.
Full textAlwan, Zena Ahmed, Hamid Mohammed Farhan, and Siraj Qays Mahdi. "Color image steganography in YCbCr space." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 202. http://dx.doi.org/10.11591/ijece.v10i1.pp202-209.
Full textMohammed Zaki, Hassan. "Color Pattern Steganography in Images." Technium: Romanian Journal of Applied Sciences and Technology 9 (April 21, 2023): 60–65. http://dx.doi.org/10.47577/technium.v9i.8337.
Full textZhang, Shanqing, Shengqi Su, Li Li, Qili Zhou, Jianfeng Lu, and Chin-Chen Chang. "An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography." Symmetry 11, no. 9 (September 11, 2019): 1152. http://dx.doi.org/10.3390/sym11091152.
Full textEyssa, Asmaa Abdelmonem, Fathi Elsaid Abdelsamie, and Abdelaziz Elsaid Abdelnaiem. "An Efficient Image Steganography Approach over Wireless Communication System." Wireless Personal Communications 110, no. 1 (September 21, 2019): 321–37. http://dx.doi.org/10.1007/s11277-019-06730-2.
Full textPourArian, Mohammad Rasoul, and Ali Hanani. "Blind Steganography in Color Images by Double Wavelet Transform and Improved Arnold Transform." Indonesian Journal of Electrical Engineering and Computer Science 3, no. 3 (September 1, 2016): 586. http://dx.doi.org/10.11591/ijeecs.v3.i3.pp586-600.
Full textShao, Guoqiang, Longmei Jie, and Dan Shen. "A Novel Steganography Scheme for Color Image Based on HLS Translation." Journal of Physics: Conference Series 2025, no. 1 (September 1, 2021): 012058. http://dx.doi.org/10.1088/1742-6596/2025/1/012058.
Full textXiao, Hong, and Panchi Li. "Quantum steganography based on reflected gray code for color images." Intelligent Decision Technologies 14, no. 3 (September 29, 2020): 291–312. http://dx.doi.org/10.3233/idt-190034.
Full textHutapea, Destri Yanti, and Octaviani Hutapea. "WATERMARKING METHOD OF REMOTE SENSING DATA USING STEGANOGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT HIDING." International Journal of Remote Sensing and Earth Sciences (IJReSES) 15, no. 1 (July 6, 2018): 63. http://dx.doi.org/10.30536/j.ijreses.2018.v15.a2824.
Full textDissertations / Theses on the topic "COLOR IMAGE STEGANOGRAPHY"
Abdulrahman, Hasan. "Oriented filters for feature extraction in digital Images : Application to corners detection, Contours evaluation and color Steganalysis." Thesis, Montpellier, 2017. http://www.theses.fr/2017MONTS077/document.
Full textInterpretation of image contents is very important objective in image processing and computer vision. Wherefore, it has received much attention of researchers. An image contains a lot of information which can be studied such as color, shapes, edges, corners, size, and orientation. Moreover, contours include the most important structures in the image. In order to extract features contour of an object, we must detect the edges of that object. Edge detection results, remains a key point and very important step in wide range of applications such as: image restoration, enhancement, steganography, watermarking, image retrieval, recognition, compression, and etc. An efficient boundary detection method should create a contour image containing edges at their correct locations with a minimum of misclassified pixels. However, the performance evaluationof the edge detection results is still a challenging problem. The digital images are sometimes modify by a legal or illegal data in order to send special or secret data. These changes modify slight coefficient values of the image. In order to be less visible, most of the steganography methods modify the pixel values in the edge/texture image areas. Therefore, it is important to detect the presence of hidden data in digital images. This thesis is divided mainly into two main parts. The first part, deals with filtering edge detection, contours evaluation and corners detection methods. More deeply, there are five contributions are presented in this part: first, proposed a new normalized supervised edge map quality measure. The strategy to normalize the evaluation enables to consider a score close to 0 as a good edge map, whereas a score 1 translates a poor segmentation. Second, proposed a new technique to evaluate filtering edge detection methods involving the minimum score of the considerate measures. Moreover, build a new ground truth edge map labelled in semi-automatic way in real images. Third, proposed a new measure takes into account the distances of false positive points to evaluate an edge detector in an objective way. Finally, proposed a new approach for corner detection based on the combination of directional derivative and homogeneity kernels. The proposed approach remains more stable and robust to noise than ten famous corner detection methods. The second part, deals with color image steganalysis, based on a machine learning classification. More deeply, there are three contributionsare presented in this part: first, proposed a new color image steganalysis method based on extract color features from correlations between the gradients of red, green and blue channels. Since these features give the cosine of angles between gradients. Second, proposed a new color steganalysis method based on geometric measures obtained by the sine and cosine of gradient angles between all the color channels. Finally, proposed a new approach for color image steganalysisbased on steerable Gaussian filters Bank.All the three proposed methods in this part, provide interesting and promising results by outperforming the state-of-art color image steganalysis
Tseng, Hsin-Chun, and 曾信淳. "A Study on Adaptive Steganography-based Optical Color Image Cryptosystem." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/95881906324364679106.
Full text亞洲大學
資訊工程學系碩士班
98
In this thesis, an optical color image cryptosystem with a color image and data hiding scheme is proposed. In the proposed optical cryptosystem, a secret color image is embedded into host image of the same size to become a stego-image. The secret color image is hidden in the phase term of the host image. Then the stego-image is encrypted by the optical cryptosystem which employs a double random phase encoding algorithm. During the encoding process, secret data is embedded into the encrypted image by an adaptive steganographic technique. The secret image and data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. In comparison with the traditional hiding scheme, a high data embedding capacity and high visual quality of the decrypted host and secret images are achieved. Experimental results show that the proposed image and data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
Lin, Hung-Jen, and 林泓任. "True Color Image Steganography Using Palette and Minimum Spanning Tree." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/82039255082858476168.
Full text大葉大學
資訊工程學系碩士班
94
Steganography is a application of data hiding, the main point is that increases the security and camouflage by hiding secret message into digital media to send to other person. Some methods and literatures get stego image after embedding secret message by using a color set which had be created by clustering and quantification. The other people can get secret message by using the color set, which is the same with sender, and some procedures after receiving the stego image. But the color set usually limits the quality of stego image, and there is difference about the type and accuracy of color set by using the different of methods about clustering and quantification, it has influence on stego image. This paper aimed this defect and proposed a new method to reduce the influence, caused by color set, on stego image. Our main target is true color image, it usually be reduced the number of colors by the color set in some traditional methods, the influence is very serious. The stego image created by our method do not be reduced the number of colors by the color set, so the type of it is the same with original image. The structure of embedding secret message is decided by minimum spanning tree. In the final we propose the result by experiment and comparing with other methods to show the improvement of our method.
kanagi, Karamo, and 卡拉莫. "Steganography by Color Images Using Advanced Encryption Standard (AES)." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/72471940294150032343.
Full text國立清華大學
資訊系統與應用研究所
103
資訊安全近期在資料通訊中佔有很大的重要議題。其中,影像藏密及密碼學都是確保祕密訊息的方法。影像藏密是把一張訊息藏在數位媒體並且遮掩一些資訊。但是如果分開使用這些技術,並沒有辦法完整的保護資訊安全。為了要保護資訊安全及機密資訊,我們必須結合影像藏密及密碼學去提供更強大的資訊通訊來防止入侵者。 在這篇論文中,我們提供一個影像藏密的方法去專注在24位元的彩色影像。這項方法使用了標籤圖像文件格式,並且在使用最低有效位(LSB)方法的圖像嵌入裡面,使用AES 128位元的加密算法的秘密信息進行加密,透過減少到封面圖像所做的更改量來提高LSB的方法。在這項實驗中,比較分析了通過計算均方誤差(MSE)和峰值信噪比(PSNR)證明了該方法的有效性。最後的結果顯示此方法能保持圖像質量和安全的更高的水平。
Lin, Kai-Chun, and 林凱鈞. "The Study of Steganographic Scheme with Tolerating Losing Compression Process for Color Image." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/56344319046873135894.
Full text淡江大學
資訊工程學系碩士班
93
In this paper, we present a new steganographic scheme used to embed secret text data into color images. Not only preserve the visual quality, we can use JPEG to com-press the stego-image. JPEG is the most common used image compression technique which reduces the image size drastically without losing the image quality seriously. There are many steganographic scheme have been proposed, but most of them can’t tolerate JPEG compression. That is, after JPEG compressing, the hidden data will be damaged critically. If the embedding data are pictures, accuracy losing would be ac-cepted. But for text data embedding approaches, even one bit error will lead the ex-tracted data to be totally useless. In our scheme, the hidden data are encoded by error correction technique first. Then we embed the encoded data in the spatial domain di-rectly by adjusting the pixel relation in each 3×3 image block. We also adopt the concept of error diffusion method used in halftone technique to improve the image quality to human visual system. By this way, the extracted data from a compressed stego-image could be completely correct.
Tseng, Chiung-Chen, and 曾瓊蓁. "A High Payload Steganography Scheme for Color Images Based on BTC and Hybrid Strategy." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/03826317414928902865.
Full text亞洲大學
資訊工程學系
103
With advances in computer networks and applications, the Internet has become indispensable to delivering confidential data. Information security is a prime concern as people’s use of the Internet increases. Various research studies have been done to better protect data in transit and ensure information security. Cryptographic methods and steganography are the most commonly used strategies to secure communications on the Internet. To compliment cryptographic methods, which do not hide secret data in transmitted packets, steganography is used to embed secret data so that unintended recipients are unaware of the secret data been transmitted in a steganographic image. Therefore, the quality of the stego image must be high for the embedded secret message. In general, information hiding (also called data hiding or data embedding) technique includes digital watermarking and steganography. These information hiding methods are currently used by many researchers for various applications. Embedding capacity is one of the key issues in data hiding research. In theory, a higher embedding capacity in the original medium usually means poorer visual quality. Block Truncation Coding (BTC) is one of the popular compression techniques used in image data hiding because of its low computation cost and ease of implementation. For a color image, there are three pairs of high mean and low mean values with three bitmaps. A common bitmap can be used to reduce the size of the BTC compression code. Chang et al. presented a data hiding method to conceal secret data in the color image BTC compression code by rearranging the encoding sequences of the high mean and low mean values. The proposed method attempts to embed more secret data into the color BTC compression code. In this thesis, a novel method is proposed to encrypt data based on the number of the element ‘1’. If the number is even, the data for the secret bit is ‘0’; otherwise, the secret bit is ‘1’. Furthermore, the Less Significant Bit (LSB) of all high mean and low mean pairs can also be used to embed the secret data. Experimental results show that with the proposed method, each block conceals at least 10 secret bits while good visual quality is maintained.
Book chapters on the topic "COLOR IMAGE STEGANOGRAPHY"
Singla, Deepali, and Mamta Juneja. "Hybrid Edge Detection-Based Image Steganography Technique for Color Images." In Advances in Intelligent Systems and Computing, 277–80. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2009-1_32.
Full textGoswami, Anirban, Dipankar Pal, and Nabin Ghoshal. "Two Stage Color Image Steganography Using DCT (TSCIS-DCT)." In Advances in Intelligent Systems and Computing, 755–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35314-7_86.
Full textZeng, Cheng, Jingbing Li, Jingjun Zhou, and Saqib Ali Nawaz. "Color Image Steganography Scheme Based on Convolutional Neural Network." In Advances in Artificial Intelligence and Security, 265–77. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78621-2_21.
Full textHu, Yu-Chen, Chin-Feng Lee, and Yi-Hung Liu. "Reversible Image Steganography for Color Image Quantization Based on Lossless Index Coding." In Security with Intelligent Computing and Big-data Services, 185–95. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76451-1_18.
Full textSharma, Annu, Kalpana Sharma, and Amit Kr Chaturvedi. "Proposing a Novel Scheme for Improving LSB Image Steganography with Color Image." In Proceedings of International Conference on Communication and Artificial Intelligence, 399–407. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0976-4_33.
Full textKhashandarag, Asghar Shahrzad, Ahmad Habibizad Navin, Mir Kamal Mirnia, and Hamid Haji Agha Mohammadi. "An Optimized Color Image Steganography Using LFSR and DFT Techniques." In Advanced Research on Computer Education, Simulation and Modeling, 247–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21802-6_40.
Full textShet, K. Sathish, Nagaveni, and A. R. Aswath. "Image Steganography Using Integer Wavelet Transform Based on Color Space Approach." In Advances in Intelligent Systems and Computing, 839–48. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11933-5_95.
Full textInan, Yucel. "Quality Metrics of LSB Image Steganography Technique for Color Space HSI." In 11th International Conference on Theory and Application of Soft Computing, Computing with Words and Perceptions and Artificial Intelligence - ICSCCW-2021, 67–74. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92127-9_13.
Full textLi, Ya-Lin, and Wen-Hsiang Tsai. "New Image Steganography via Secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation." In Advances in Visual Computing, 64–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24031-7_7.
Full textNolkha, Avneesh, Sunil Kumar, and V. S. Dhaka. "Image Steganography Using LSB Substitution: A Comparative Analysis on Different Color Models." In Smart Systems and IoT: Innovations in Computing, 711–18. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8406-6_67.
Full textConference papers on the topic "COLOR IMAGE STEGANOGRAPHY"
Ahuja, Sarthak, C. Udaya Kumar, and S. Hemalatha. "Competitive Coevolution for Color Image Steganography." In 2019 International Conference on Intelligent Computing and Control Systems (ICCS). IEEE, 2019. http://dx.doi.org/10.1109/iccs45141.2019.9065844.
Full textYang, Ching-Yu. "Color Image Steganography Based on Module Substitutions." In Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/iihmsp.2007.4457667.
Full textHemalatha, R. K., and Patra Maneesha. "Unified embedding method for color image steganography." In 2016 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2016. http://dx.doi.org/10.1109/icices.2016.7518872.
Full textChuang, Cheng-Hung, and Guo-Shiang Lin. "Adaptive steganography-based optical color image cryptosystems." In 2009 IEEE International Symposium on Circuits and Systems - ISCAS 2009. IEEE, 2009. http://dx.doi.org/10.1109/iscas.2009.5118094.
Full textJani Anbarasi, L., and S. Kannan. "Secured secret color image sharing with steganography." In 2012 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2012. http://dx.doi.org/10.1109/icrtit.2012.6206748.
Full textAnurag and Shweta Meena. "Color Image Steganography Using Random Key Matrix." In 2018 3rd International Conference for Convergence in Technology (I2CT). IEEE, 2018. http://dx.doi.org/10.1109/i2ct.2018.8529425.
Full textkumar, Deepak. "Hiding Text In Color Image Using YCbCr Color Model: An Image Steganography approach." In 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE, 2019. http://dx.doi.org/10.1109/icict46931.2019.8977644.
Full textPrabakaran, G., R. Bhavani, and S. Sankaran. "Dual Wavelet Transform in Color Image Steganography Method." In 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892512.
Full textMunoz-Ramirez, David O., Volodymyr I. Ponomaryov, Rogelio Reyes-Reyes, and Clara Cruz-Ramos. "Parallel steganography framework for hiding a color image inside stereo images." In SPIE Commercial + Scientific Sensing and Imaging, edited by Nasser Kehtarnavaz and Matthias F. Carlsohn. SPIE, 2017. http://dx.doi.org/10.1117/12.2262163.
Full textMondal, Saikat, Rameswar Debnath, and Borun Kumar Mondal. "An improved color image steganography technique in spatial domain." In 2016 9th International Conference on Electrical and Computer Engineering (ICECE). IEEE, 2016. http://dx.doi.org/10.1109/icece.2016.7853987.
Full text