Gotowa bibliografia na temat „COLOR IMAGE STEGANOGRAPHY”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „COLOR IMAGE STEGANOGRAPHY”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "COLOR IMAGE STEGANOGRAPHY"
Xu, Meng, Xiangyang Luo, Jinwei Wang i Hao Wang. "Color image steganalysis based on quaternion discrete cosine transform". Electronic Research Archive 31, nr 7 (2023): 4102–18. http://dx.doi.org/10.3934/era.2023209.
Pełny tekst źródłaSundos A. Hameed Al-azawi i Abbas A. AbulHameed. "Information Hiding in Color Image Using Steganographic technique". Journal of the College of Basic Education 17, nr 70 (22.12.2022): 113–22. http://dx.doi.org/10.35950/cbej.vi.8480.
Pełny tekst źródłaAlwan, Zena Ahmed, Hamid Mohammed Farhan i Siraj Qays Mahdi. "Color image steganography in YCbCr space". International Journal of Electrical and Computer Engineering (IJECE) 10, nr 1 (1.02.2020): 202. http://dx.doi.org/10.11591/ijece.v10i1.pp202-209.
Pełny tekst źródłaMohammed Zaki, Hassan. "Color Pattern Steganography in Images". Technium: Romanian Journal of Applied Sciences and Technology 9 (21.04.2023): 60–65. http://dx.doi.org/10.47577/technium.v9i.8337.
Pełny tekst źródłaZhang, Shanqing, Shengqi Su, Li Li, Qili Zhou, Jianfeng Lu i Chin-Chen Chang. "An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography". Symmetry 11, nr 9 (11.09.2019): 1152. http://dx.doi.org/10.3390/sym11091152.
Pełny tekst źródłaEyssa, Asmaa Abdelmonem, Fathi Elsaid Abdelsamie i Abdelaziz Elsaid Abdelnaiem. "An Efficient Image Steganography Approach over Wireless Communication System". Wireless Personal Communications 110, nr 1 (21.09.2019): 321–37. http://dx.doi.org/10.1007/s11277-019-06730-2.
Pełny tekst źródłaPourArian, Mohammad Rasoul, i Ali Hanani. "Blind Steganography in Color Images by Double Wavelet Transform and Improved Arnold Transform". Indonesian Journal of Electrical Engineering and Computer Science 3, nr 3 (1.09.2016): 586. http://dx.doi.org/10.11591/ijeecs.v3.i3.pp586-600.
Pełny tekst źródłaShao, Guoqiang, Longmei Jie i Dan Shen. "A Novel Steganography Scheme for Color Image Based on HLS Translation". Journal of Physics: Conference Series 2025, nr 1 (1.09.2021): 012058. http://dx.doi.org/10.1088/1742-6596/2025/1/012058.
Pełny tekst źródłaXiao, Hong, i Panchi Li. "Quantum steganography based on reflected gray code for color images". Intelligent Decision Technologies 14, nr 3 (29.09.2020): 291–312. http://dx.doi.org/10.3233/idt-190034.
Pełny tekst źródłaHutapea, Destri Yanti, i Octaviani Hutapea. "WATERMARKING METHOD OF REMOTE SENSING DATA USING STEGANOGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT HIDING". International Journal of Remote Sensing and Earth Sciences (IJReSES) 15, nr 1 (6.07.2018): 63. http://dx.doi.org/10.30536/j.ijreses.2018.v15.a2824.
Pełny tekst źródłaRozprawy doktorskie na temat "COLOR IMAGE STEGANOGRAPHY"
Abdulrahman, Hasan. "Oriented filters for feature extraction in digital Images : Application to corners detection, Contours evaluation and color Steganalysis". Thesis, Montpellier, 2017. http://www.theses.fr/2017MONTS077/document.
Pełny tekst źródłaInterpretation of image contents is very important objective in image processing and computer vision. Wherefore, it has received much attention of researchers. An image contains a lot of information which can be studied such as color, shapes, edges, corners, size, and orientation. Moreover, contours include the most important structures in the image. In order to extract features contour of an object, we must detect the edges of that object. Edge detection results, remains a key point and very important step in wide range of applications such as: image restoration, enhancement, steganography, watermarking, image retrieval, recognition, compression, and etc. An efficient boundary detection method should create a contour image containing edges at their correct locations with a minimum of misclassified pixels. However, the performance evaluationof the edge detection results is still a challenging problem. The digital images are sometimes modify by a legal or illegal data in order to send special or secret data. These changes modify slight coefficient values of the image. In order to be less visible, most of the steganography methods modify the pixel values in the edge/texture image areas. Therefore, it is important to detect the presence of hidden data in digital images. This thesis is divided mainly into two main parts. The first part, deals with filtering edge detection, contours evaluation and corners detection methods. More deeply, there are five contributions are presented in this part: first, proposed a new normalized supervised edge map quality measure. The strategy to normalize the evaluation enables to consider a score close to 0 as a good edge map, whereas a score 1 translates a poor segmentation. Second, proposed a new technique to evaluate filtering edge detection methods involving the minimum score of the considerate measures. Moreover, build a new ground truth edge map labelled in semi-automatic way in real images. Third, proposed a new measure takes into account the distances of false positive points to evaluate an edge detector in an objective way. Finally, proposed a new approach for corner detection based on the combination of directional derivative and homogeneity kernels. The proposed approach remains more stable and robust to noise than ten famous corner detection methods. The second part, deals with color image steganalysis, based on a machine learning classification. More deeply, there are three contributionsare presented in this part: first, proposed a new color image steganalysis method based on extract color features from correlations between the gradients of red, green and blue channels. Since these features give the cosine of angles between gradients. Second, proposed a new color steganalysis method based on geometric measures obtained by the sine and cosine of gradient angles between all the color channels. Finally, proposed a new approach for color image steganalysisbased on steerable Gaussian filters Bank.All the three proposed methods in this part, provide interesting and promising results by outperforming the state-of-art color image steganalysis
Tseng, Hsin-Chun, i 曾信淳. "A Study on Adaptive Steganography-based Optical Color Image Cryptosystem". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/95881906324364679106.
Pełny tekst źródła亞洲大學
資訊工程學系碩士班
98
In this thesis, an optical color image cryptosystem with a color image and data hiding scheme is proposed. In the proposed optical cryptosystem, a secret color image is embedded into host image of the same size to become a stego-image. The secret color image is hidden in the phase term of the host image. Then the stego-image is encrypted by the optical cryptosystem which employs a double random phase encoding algorithm. During the encoding process, secret data is embedded into the encrypted image by an adaptive steganographic technique. The secret image and data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. In comparison with the traditional hiding scheme, a high data embedding capacity and high visual quality of the decrypted host and secret images are achieved. Experimental results show that the proposed image and data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
Lin, Hung-Jen, i 林泓任. "True Color Image Steganography Using Palette and Minimum Spanning Tree". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/82039255082858476168.
Pełny tekst źródła大葉大學
資訊工程學系碩士班
94
Steganography is a application of data hiding, the main point is that increases the security and camouflage by hiding secret message into digital media to send to other person. Some methods and literatures get stego image after embedding secret message by using a color set which had be created by clustering and quantification. The other people can get secret message by using the color set, which is the same with sender, and some procedures after receiving the stego image. But the color set usually limits the quality of stego image, and there is difference about the type and accuracy of color set by using the different of methods about clustering and quantification, it has influence on stego image. This paper aimed this defect and proposed a new method to reduce the influence, caused by color set, on stego image. Our main target is true color image, it usually be reduced the number of colors by the color set in some traditional methods, the influence is very serious. The stego image created by our method do not be reduced the number of colors by the color set, so the type of it is the same with original image. The structure of embedding secret message is decided by minimum spanning tree. In the final we propose the result by experiment and comparing with other methods to show the improvement of our method.
kanagi, Karamo, i 卡拉莫. "Steganography by Color Images Using Advanced Encryption Standard (AES)". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/72471940294150032343.
Pełny tekst źródła國立清華大學
資訊系統與應用研究所
103
資訊安全近期在資料通訊中佔有很大的重要議題。其中,影像藏密及密碼學都是確保祕密訊息的方法。影像藏密是把一張訊息藏在數位媒體並且遮掩一些資訊。但是如果分開使用這些技術,並沒有辦法完整的保護資訊安全。為了要保護資訊安全及機密資訊,我們必須結合影像藏密及密碼學去提供更強大的資訊通訊來防止入侵者。 在這篇論文中,我們提供一個影像藏密的方法去專注在24位元的彩色影像。這項方法使用了標籤圖像文件格式,並且在使用最低有效位(LSB)方法的圖像嵌入裡面,使用AES 128位元的加密算法的秘密信息進行加密,透過減少到封面圖像所做的更改量來提高LSB的方法。在這項實驗中,比較分析了通過計算均方誤差(MSE)和峰值信噪比(PSNR)證明了該方法的有效性。最後的結果顯示此方法能保持圖像質量和安全的更高的水平。
Lin, Kai-Chun, i 林凱鈞. "The Study of Steganographic Scheme with Tolerating Losing Compression Process for Color Image". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/56344319046873135894.
Pełny tekst źródła淡江大學
資訊工程學系碩士班
93
In this paper, we present a new steganographic scheme used to embed secret text data into color images. Not only preserve the visual quality, we can use JPEG to com-press the stego-image. JPEG is the most common used image compression technique which reduces the image size drastically without losing the image quality seriously. There are many steganographic scheme have been proposed, but most of them can’t tolerate JPEG compression. That is, after JPEG compressing, the hidden data will be damaged critically. If the embedding data are pictures, accuracy losing would be ac-cepted. But for text data embedding approaches, even one bit error will lead the ex-tracted data to be totally useless. In our scheme, the hidden data are encoded by error correction technique first. Then we embed the encoded data in the spatial domain di-rectly by adjusting the pixel relation in each 3×3 image block. We also adopt the concept of error diffusion method used in halftone technique to improve the image quality to human visual system. By this way, the extracted data from a compressed stego-image could be completely correct.
Tseng, Chiung-Chen, i 曾瓊蓁. "A High Payload Steganography Scheme for Color Images Based on BTC and Hybrid Strategy". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/03826317414928902865.
Pełny tekst źródła亞洲大學
資訊工程學系
103
With advances in computer networks and applications, the Internet has become indispensable to delivering confidential data. Information security is a prime concern as people’s use of the Internet increases. Various research studies have been done to better protect data in transit and ensure information security. Cryptographic methods and steganography are the most commonly used strategies to secure communications on the Internet. To compliment cryptographic methods, which do not hide secret data in transmitted packets, steganography is used to embed secret data so that unintended recipients are unaware of the secret data been transmitted in a steganographic image. Therefore, the quality of the stego image must be high for the embedded secret message. In general, information hiding (also called data hiding or data embedding) technique includes digital watermarking and steganography. These information hiding methods are currently used by many researchers for various applications. Embedding capacity is one of the key issues in data hiding research. In theory, a higher embedding capacity in the original medium usually means poorer visual quality. Block Truncation Coding (BTC) is one of the popular compression techniques used in image data hiding because of its low computation cost and ease of implementation. For a color image, there are three pairs of high mean and low mean values with three bitmaps. A common bitmap can be used to reduce the size of the BTC compression code. Chang et al. presented a data hiding method to conceal secret data in the color image BTC compression code by rearranging the encoding sequences of the high mean and low mean values. The proposed method attempts to embed more secret data into the color BTC compression code. In this thesis, a novel method is proposed to encrypt data based on the number of the element ‘1’. If the number is even, the data for the secret bit is ‘0’; otherwise, the secret bit is ‘1’. Furthermore, the Less Significant Bit (LSB) of all high mean and low mean pairs can also be used to embed the secret data. Experimental results show that with the proposed method, each block conceals at least 10 secret bits while good visual quality is maintained.
Części książek na temat "COLOR IMAGE STEGANOGRAPHY"
Singla, Deepali, i Mamta Juneja. "Hybrid Edge Detection-Based Image Steganography Technique for Color Images". W Advances in Intelligent Systems and Computing, 277–80. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2009-1_32.
Pełny tekst źródłaGoswami, Anirban, Dipankar Pal i Nabin Ghoshal. "Two Stage Color Image Steganography Using DCT (TSCIS-DCT)". W Advances in Intelligent Systems and Computing, 755–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35314-7_86.
Pełny tekst źródłaZeng, Cheng, Jingbing Li, Jingjun Zhou i Saqib Ali Nawaz. "Color Image Steganography Scheme Based on Convolutional Neural Network". W Advances in Artificial Intelligence and Security, 265–77. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78621-2_21.
Pełny tekst źródłaHu, Yu-Chen, Chin-Feng Lee i Yi-Hung Liu. "Reversible Image Steganography for Color Image Quantization Based on Lossless Index Coding". W Security with Intelligent Computing and Big-data Services, 185–95. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76451-1_18.
Pełny tekst źródłaSharma, Annu, Kalpana Sharma i Amit Kr Chaturvedi. "Proposing a Novel Scheme for Improving LSB Image Steganography with Color Image". W Proceedings of International Conference on Communication and Artificial Intelligence, 399–407. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0976-4_33.
Pełny tekst źródłaKhashandarag, Asghar Shahrzad, Ahmad Habibizad Navin, Mir Kamal Mirnia i Hamid Haji Agha Mohammadi. "An Optimized Color Image Steganography Using LFSR and DFT Techniques". W Advanced Research on Computer Education, Simulation and Modeling, 247–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21802-6_40.
Pełny tekst źródłaShet, K. Sathish, Nagaveni i A. R. Aswath. "Image Steganography Using Integer Wavelet Transform Based on Color Space Approach". W Advances in Intelligent Systems and Computing, 839–48. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11933-5_95.
Pełny tekst źródłaInan, Yucel. "Quality Metrics of LSB Image Steganography Technique for Color Space HSI". W 11th International Conference on Theory and Application of Soft Computing, Computing with Words and Perceptions and Artificial Intelligence - ICSCCW-2021, 67–74. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92127-9_13.
Pełny tekst źródłaLi, Ya-Lin, i Wen-Hsiang Tsai. "New Image Steganography via Secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation". W Advances in Visual Computing, 64–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24031-7_7.
Pełny tekst źródłaNolkha, Avneesh, Sunil Kumar i V. S. Dhaka. "Image Steganography Using LSB Substitution: A Comparative Analysis on Different Color Models". W Smart Systems and IoT: Innovations in Computing, 711–18. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8406-6_67.
Pełny tekst źródłaStreszczenia konferencji na temat "COLOR IMAGE STEGANOGRAPHY"
Ahuja, Sarthak, C. Udaya Kumar i S. Hemalatha. "Competitive Coevolution for Color Image Steganography". W 2019 International Conference on Intelligent Computing and Control Systems (ICCS). IEEE, 2019. http://dx.doi.org/10.1109/iccs45141.2019.9065844.
Pełny tekst źródłaYang, Ching-Yu. "Color Image Steganography Based on Module Substitutions". W Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/iihmsp.2007.4457667.
Pełny tekst źródłaHemalatha, R. K., i Patra Maneesha. "Unified embedding method for color image steganography". W 2016 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2016. http://dx.doi.org/10.1109/icices.2016.7518872.
Pełny tekst źródłaChuang, Cheng-Hung, i Guo-Shiang Lin. "Adaptive steganography-based optical color image cryptosystems". W 2009 IEEE International Symposium on Circuits and Systems - ISCAS 2009. IEEE, 2009. http://dx.doi.org/10.1109/iscas.2009.5118094.
Pełny tekst źródłaJani Anbarasi, L., i S. Kannan. "Secured secret color image sharing with steganography". W 2012 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2012. http://dx.doi.org/10.1109/icrtit.2012.6206748.
Pełny tekst źródłaAnurag i Shweta Meena. "Color Image Steganography Using Random Key Matrix". W 2018 3rd International Conference for Convergence in Technology (I2CT). IEEE, 2018. http://dx.doi.org/10.1109/i2ct.2018.8529425.
Pełny tekst źródłakumar, Deepak. "Hiding Text In Color Image Using YCbCr Color Model: An Image Steganography approach". W 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE, 2019. http://dx.doi.org/10.1109/icict46931.2019.8977644.
Pełny tekst źródłaPrabakaran, G., R. Bhavani i S. Sankaran. "Dual Wavelet Transform in Color Image Steganography Method". W 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892512.
Pełny tekst źródłaMunoz-Ramirez, David O., Volodymyr I. Ponomaryov, Rogelio Reyes-Reyes i Clara Cruz-Ramos. "Parallel steganography framework for hiding a color image inside stereo images". W SPIE Commercial + Scientific Sensing and Imaging, redaktorzy Nasser Kehtarnavaz i Matthias F. Carlsohn. SPIE, 2017. http://dx.doi.org/10.1117/12.2262163.
Pełny tekst źródłaMondal, Saikat, Rameswar Debnath i Borun Kumar Mondal. "An improved color image steganography technique in spatial domain". W 2016 9th International Conference on Electrical and Computer Engineering (ICECE). IEEE, 2016. http://dx.doi.org/10.1109/icece.2016.7853987.
Pełny tekst źródła