Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: COLOR IMAGE STEGANOGRAPHY.

Artykuły w czasopismach na temat „COLOR IMAGE STEGANOGRAPHY”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „COLOR IMAGE STEGANOGRAPHY”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Xu, Meng, Xiangyang Luo, Jinwei Wang i Hao Wang. "Color image steganalysis based on quaternion discrete cosine transform". Electronic Research Archive 31, nr 7 (2023): 4102–18. http://dx.doi.org/10.3934/era.2023209.

Pełny tekst źródła
Streszczenie:
<abstract> <p>With the rapid development and application of Internet technology in recent years, the issue of information security has received more and more attention. Digital steganography is used as a means of secure communication to hide information by modifying the carrier. However, steganography can also be used for illegal acts, so it is of great significance to study steganalysis techniques. The steganalysis technology can be used to solve the illegal steganography problem of computer vision and engineering applications technology. Most of the images in the Internet are color images, and steganalysis for color images is a very critical problem in the field of steganalysis at this stage. Currently proposed algorithms for steganalysis of color images mainly rely on the manual design of steganographic features, and the steganographic features do not fully consider the internal connection between the three channels of color images. In recent years, advanced steganography techniques for color images have been proposed, which brings more serious challenges to color image steganalysis. Quaternions are a good tool to represent color images, and the transformation of quaternions can fully exploit the correlation among color image channels. In this paper, we propose a color image steganalysis algorithm based on quaternion discrete cosine transform, firstly, the image is represented by quaternion, then the quaternion discrete cosine transform is applied to it, and the coefficients obtained from the transformation are extracted to design features of the coeval matrix. The experimental results show that the proposed algorithm works better than the typical color image steganalysis algorithm.</p> </abstract>
Style APA, Harvard, Vancouver, ISO itp.
2

Sundos A. Hameed Al-azawi i Abbas A. AbulHameed. "Information Hiding in Color Image Using Steganographic technique". Journal of the College of Basic Education 17, nr 70 (22.12.2022): 113–22. http://dx.doi.org/10.35950/cbej.vi.8480.

Pełny tekst źródła
Streszczenie:
Steganography is one of the important research subjects in the field of information security. It enables secret communication by embedding messages in the texts, images, audio, video files or other digital carriers. Among all the image information hiding methods, LSB embedding is widely used for its high hiding capacity and it is with great significance to detect the images with hidden messages produced by LSB embedding effectively, accurately and reliably. Therefore, many experts made efforts on the LSB steganography and steganalysis research over the years. This research presents a steganographic technique based on using LSB of one of the pixel color components in the image and changes them according to the message’s bits to hide. The rest of bits in the pixel color component selected are also changed in order get the nearest color to the original one in the scale of colors. This new method has been tested with others that work in the spatial domain through applying some common metrics which give us good result as a compared with the other steganographic tools.
Style APA, Harvard, Vancouver, ISO itp.
3

Alwan, Zena Ahmed, Hamid Mohammed Farhan i Siraj Qays Mahdi. "Color image steganography in YCbCr space". International Journal of Electrical and Computer Engineering (IJECE) 10, nr 1 (1.02.2020): 202. http://dx.doi.org/10.11591/ijece.v10i1.pp202-209.

Pełny tekst źródła
Streszczenie:
Steganography is a best method for in secret communicating information during the transference of data. Images are an appropriate method that used in steganography can be used to protection the simple bits and pieces. Several systems, this one as color scale images steganography and grayscale images steganography, are used on color and store data in different techniques. These color images can have very big amounts of secret data, by using three main color modules. The different color modules, such as HSV-(hue, saturation, and value), RGB-(red, green, and blue), YCbCr-(luminance and chrominance), YUV, YIQ, etc. This paper uses unusual module to hide data: an adaptive procedure that can increase security ranks when hiding a top secret binary image in a RGB color image, which we implement the steganography in the YCbCr module space. We performed Exclusive-OR (XOR) procedures between the binary image and the RGB color image in the YCBCR module space. The converted byte stored in the 8-bit LSB is not the actual bytes; relatively, it is obtained by translation to another module space and applies the XOR procedure. This technique is practical to different groups of images. Moreover, we see that the adaptive technique ensures good results as the peak signal to noise ratio (PSNR) and stands for mean square error (MSE) are good. When the technique is compared with our previous works and other existing techniques, it is shown to be the best in both error and message capability. This technique is easy to model and simple to use and provides perfect security with unauthorized.
Style APA, Harvard, Vancouver, ISO itp.
4

Mohammed Zaki, Hassan. "Color Pattern Steganography in Images". Technium: Romanian Journal of Applied Sciences and Technology 9 (21.04.2023): 60–65. http://dx.doi.org/10.47577/technium.v9i.8337.

Pełny tekst źródła
Streszczenie:
Text steganography into images is one of the important strategies that are used to hide the transmitted secret messages via internet connections. Most of the proposed methods required mapping key to recover the hidden secret messages and implement more complex algorithms in hiding and recovering processes. The paper proposed an improved method to hide text in image cove based on the color pattern of the cover image. It based on the sequence of the new occurrence of the color. The results showed that the proposed method has high performance in hiding with extremely low PSNR(<0.002). The low differences between the original image and the stegno image provide more secured hiding that satisfied the State-of-Art. The proposed method can be used in transmitting classified and confidential messages via public internet connections.
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Shanqing, Shengqi Su, Li Li, Qili Zhou, Jianfeng Lu i Chin-Chen Chang. "An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography". Symmetry 11, nr 9 (11.09.2019): 1152. http://dx.doi.org/10.3390/sym11091152.

Pełny tekst źródła
Streszczenie:
Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis possible. A coverless steganographic approach without any modification for transmitting secret color image is proposed. We propose a diversity image style transfer network using multilevel noise encoding. The network consists of a generator and a loss network. A multilevel noise to encode matching the subsequent convolutional neural network scale is used in the generator. The diversity loss is increased in the loss network so that the network can generate diverse image style transfer results. Residual learning is introduced so that the training speed of network is significantly improved. Experiments show that the network can generate stable results with uniform texture distribution in a short period of time. These image style transfer results can be integrated into our coverless steganography scheme. The performance of our steganography scheme is good in steganographic capacity, anti-steganalysis, security, and robustness.
Style APA, Harvard, Vancouver, ISO itp.
6

Eyssa, Asmaa Abdelmonem, Fathi Elsaid Abdelsamie i Abdelaziz Elsaid Abdelnaiem. "An Efficient Image Steganography Approach over Wireless Communication System". Wireless Personal Communications 110, nr 1 (21.09.2019): 321–37. http://dx.doi.org/10.1007/s11277-019-06730-2.

Pełny tekst źródła
Streszczenie:
Abstract This paper presents a robust color image steganography approach for image communication over wireless communication systems. The objective of this approach is to hide three color images in one color cover image to increase the capacity of hiding as most previously published steganography approaches suffer from a capacity problem. Moreover, the investigation of wireless communication of steganography images is presented in this paper to study the sensitivity of extraction of hidden images to the channel degradation effects, which is not studied appropriately in the literature. The proposed approach depends on the Discrete Cosine and Discrete Wavelet transform. The cover image is first transformed to luminance and chrominance components for embedding the images to be hidden. The secret images are encrypted by chaotic Baker map, which is a good representative of the family of permutation-based algorithms, which tolerate the channel degradations better. The investigated wireless communication system is the Orthogonal Frequency Division Multiplexing system with channel equalization. The simulation results reveal the success of the proposed work for robust image communication.
Style APA, Harvard, Vancouver, ISO itp.
7

PourArian, Mohammad Rasoul, i Ali Hanani. "Blind Steganography in Color Images by Double Wavelet Transform and Improved Arnold Transform". Indonesian Journal of Electrical Engineering and Computer Science 3, nr 3 (1.09.2016): 586. http://dx.doi.org/10.11591/ijeecs.v3.i3.pp586-600.

Pełny tekst źródła
Streszczenie:
<p>Steganography is a method which can put data into a media without a tangible impact on the cover media. In addition, the hidden data can be extracted with minimal differences. In this paper, two-dimensional discrete wavelet transform is used for steganography in 24-bit color images. This steganography is of blind type that has no need for original images to extract the secret image. In this algorithm, by the help of a structural similarity (SSIM) and a two-dimensional correlation coefficient, it is tried to select part of sub-band cover image instead of embedding location. These sub-bands are obtained by 3-levels of applying the DWT. Also to increase the steganography resistance against cropping or insert visible watermark, two channels of color image is used simultaneously. In order to raise the security, an encryption algorithm based on Arnold transform was also added to the steganography operation. </p>
Style APA, Harvard, Vancouver, ISO itp.
8

Shao, Guoqiang, Longmei Jie i Dan Shen. "A Novel Steganography Scheme for Color Image Based on HLS Translation". Journal of Physics: Conference Series 2025, nr 1 (1.09.2021): 012058. http://dx.doi.org/10.1088/1742-6596/2025/1/012058.

Pełny tekst źródła
Streszczenie:
Abstract In recent years, steganography has attracted extensive attention, but most of steganography schemes are aimed at grayscale images. Therefore, a novel steganography scheme for color image based on HLS translation is proposed in this paper. Firstly, the color cover image is decomposed from RGB three channels to HLS three channels. Then the image of H channel is selected as the cover image for embedding secret information due to its texture feature of original image. The universal distortion function UNIWARD is utilized to embed the secret information into the image of H channel. Finally, the steg image transmitted in common channel is obtained by inverse HLS transform using the single channel image embedding the secret information. The extensive experimental results indicate that our scheme has high security and can also resist the detection of steganalysis schemes based on CNN.
Style APA, Harvard, Vancouver, ISO itp.
9

Xiao, Hong, i Panchi Li. "Quantum steganography based on reflected gray code for color images". Intelligent Decision Technologies 14, nr 3 (29.09.2020): 291–312. http://dx.doi.org/10.3233/idt-190034.

Pełny tekst źródła
Streszczenie:
Digital steganography is the art and science of hiding information in covert channels, so as to conceal the information and prevent the detection of hidden messages. On the classic computer, the principle and method of digital steganography has been widely and deeply studied, and has been initially extended to the field of quantum computing. Quantum image steganography is a relatively active branch of quantum image processing, and the main strategy currently used is to modify the LSB of the cover image pixels. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel steganography using reflected Gray code for color quantum images, and the embedding capacity of this scheme is up to 6 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 6-bit segments. For 6 bits in each segment, the first 3 bits are embedded into the second LSB of RGB channels of the cover image, and the remaining 3 bits are embedded into the LSB of RGB channels of the cover image using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.
Style APA, Harvard, Vancouver, ISO itp.
10

Hutapea, Destri Yanti, i Octaviani Hutapea. "WATERMARKING METHOD OF REMOTE SENSING DATA USING STEGANOGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT HIDING". International Journal of Remote Sensing and Earth Sciences (IJReSES) 15, nr 1 (6.07.2018): 63. http://dx.doi.org/10.30536/j.ijreses.2018.v15.a2824.

Pełny tekst źródła
Streszczenie:
Remote sensing satellite imagery is currently needed to support the needs of information in various fields. Distribution of remote sensing data to users is done through electronic media. Therefore, it is necessary to make security and identity on remote sensing satellite images so that its function is not misused. This paper describes a method of adding confidential information to medium resolution remote sensing satellite images to identify the image using steganography technique. Steganography with the Least Significant Bit (LSB) method is chosen because the insertion of confidential information on the image is performed on the rightmost bits in each byte of data, where the rightmost bit has the smallest value. The experiment was performed on three Landsat 8 images with different area on each composite band 4,3,2 (true color) and 6,5,3 (false color). Visually the data that has been inserted information does not change with the original data. Visually, the image that has been inserted with confidential information (or stego image) is the same as the original image. Both images cannot be distinguished on histogram analysis. The Mean Squared Error value of stego images of all three data less than 0.053 compared with the original image. This means that information security with steganographic techniques using the ideal LSB method is used on remote sensing satellite imagery.
Style APA, Harvard, Vancouver, ISO itp.
11

Kang, Yuhan, Fenlin Liu, Chunfang Yang, Lingyun Xiang, Xiangyang Luo i Ping Wang. "Color image steganalysis based on channel gradient correlation". International Journal of Distributed Sensor Networks 15, nr 5 (maj 2019): 155014771985203. http://dx.doi.org/10.1177/1550147719852031.

Pełny tekst źródła
Streszczenie:
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the others, but it fails to utilize the correlation between the gradient amplitudes of different color channels. Therefore, this article points out that the color image steganography weakens the correlation between the gradient amplitudes of different color channels and proposes a color image steganalysis algorithm based on channel gradient correlation. The proposed algorithm extracts the co-occurrence matrix feature from the gradient amplitude residuals among different color channels and then combines it with the existing color image steganalysis features to train the ensemble classifier for color image steganalysis. The experimental results show that, for WOW and S-UNIWARD steganography, compared with the existing algorithms, the proposed algorithm outperforms the existing algorithms.
Style APA, Harvard, Vancouver, ISO itp.
12

Mahmood, Ahlam Fadhil, Nada Abdul Kanai i Sana Sami Mohmmad. "An FPGA Implementation of Secured Steganography Communication System". Tikrit Journal of Engineering Sciences 19, nr 4 (31.12.2012): 14–23. http://dx.doi.org/10.25130/tjes.19.4.02.

Pełny tekst źródła
Streszczenie:
Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB) matching of Steganography embedding and extracting method.In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR) method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications.
Style APA, Harvard, Vancouver, ISO itp.
13

Goel, A., V. Deswal i S. Chhabra. "A Novel Digital Color Image Steganography using Discrete Wavelet Transform (Digital Color Image Steganography using DWT)". International Journal of Computer Sciences and Engineering 7, nr 3 (31.03.2019): 266–70. http://dx.doi.org/10.26438/ijcse/v7i3.266270.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Li, Panchi, i Xiande Liu. "A novel quantum steganography scheme for color images". International Journal of Quantum Information 16, nr 02 (marzec 2018): 1850020. http://dx.doi.org/10.1142/s021974991850020x.

Pełny tekst źródła
Streszczenie:
In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.
Style APA, Harvard, Vancouver, ISO itp.
15

Zhou, Ri-Gui, Wenwen Hu, Ping Fan i Gaofeng Luo. "Quantum color image watermarking based on Arnold transformation and LSB steganography". International Journal of Quantum Information 16, nr 03 (kwiecień 2018): 1850021. http://dx.doi.org/10.1142/s0219749918500211.

Pełny tekst źródła
Streszczenie:
In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be [Formula: see text] and [Formula: see text], respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with [Formula: see text] image size and 24-qubit grayscale is further expanded to an image with size [Formula: see text] and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with [Formula: see text] size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.
Style APA, Harvard, Vancouver, ISO itp.
16

Kumar, Vijay, i Dinesh Kumar. "Performance Evaluation of Modified Color Image Steganography Using Discrete Wavelet Transform". Journal of Intelligent Systems 28, nr 5 (14.10.2017): 749–58. http://dx.doi.org/10.1515/jisys-2017-0134.

Pełny tekst źródła
Streszczenie:
Abstract Steganography is the foremost influential approach to hide data. Images serve as the most appropriate cover media for steganography. This paper intends to do a performance evaluation of color images and its comparison with the recently proposed approaches, using the modified technique already proposed for grayscale images, by the authors. This approach hides large data in color image using the blocking concept. The blocking process is applied on approximation coefficients of secret image and detail coefficients of red, green and blue components of cover image. The blocks of detail coefficients are replaced with approximation coefficients of secret image using root mean square error method. The key is used to store the position of best matching blocks. It is being predicated that the work will be able to hide large data in a single image. The stego image (ST) has better visual quality based on the peak signal to noise ratio values.
Style APA, Harvard, Vancouver, ISO itp.
17

Newaj Bhuiyan, Sharif Shah, Norun Abdul Malek, Othman Omran Khalifa i Farah Diyana Abdul Rahman. "An Improved Image Steganography Algorithm Based on PVD". Indonesian Journal of Electrical Engineering and Computer Science 10, nr 2 (1.05.2018): 569. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp569-577.

Pełny tekst źródła
Streszczenie:
In this paper, a modification of PVD (Pixel value differencing) algorithm is used for Image Steganography in spatial domain. It is normalizing secret data value by encoding method to make the new pixel edge difference less among three neighbors (horizontal, vertical and diagonal) and embedding data only to less intensity pixel difference areas or regions. The proposed algorithm shows a good improvemernt for both color and gray-scale images compared to other algorithms. Color images performance are better than gray images. However, in this work the focus is mainly on gray images. The strenght of this scheme is that any random hidden/secret data do not make any shuttle differences to Steg-image compared to original image. The bit plane slicing is used to analyze the maximum payload that has been embeded into the cover image securely. The simulation results show that the proposed algorithm is performing better and showing great consistent results for PSNR, MSE values of any images, also against Steganalysis attack.
Style APA, Harvard, Vancouver, ISO itp.
18

Abbasi, Mahdi. "Color Image Steganography using Dual Wavelet Transforms". International Journal of Computer Applications 181, nr 47 (11.04.2019): 32–38. http://dx.doi.org/10.5120/ijca2019918639.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Gaikwad, D. P., i S. J. Wagh. "Color Image Restoration for an Effective Steganography". i-manager's Journal on Software Engineering 4, nr 3 (15.03.2010): 65–71. http://dx.doi.org/10.26634/jse.4.3.1119.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Hameed, Sarab M., Sura N. Abdula i Fatin A. Dawood. "Image Steganography in De-Correlated Color Spaces". Journal of Al-Nahrain University Science 9, nr 1 (1.06.2006): 34–40. http://dx.doi.org/10.22401/jnus.9.1.06.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Bishen, Shivansh, Paurav Malik, Saloni Rao i Prakash Biswagar. "Signature Text,Image and Audio Hiding in a Color Image using Steganography and Cryptography". Journal of University of Shanghai for Science and Technology 23, nr 06 (17.06.2021): 709–20. http://dx.doi.org/10.51201/jusst/21/05337.

Pełny tekst źródła
Streszczenie:
Data Transmission in network security is one of the foremost vital issues in today’s communication world. the end result of that’s that Data security has gained utmost importance because of the unprecedented increase within the data generated over the web, which could be a basic necessity of any application in information technology. The vigorous growth within the field of data communication has made information transmission much easier. But this kind of advancement has opened many possibilities of data being snooped. So, day-by-day maintaining of data security is becoming an inseparable part of computing and communication. In this report, we’ve got explored techniques that blend cryptography and steganography together. Steganography may be a specialty of science to manage and conceal a chunk of important information inside image, audio, video, or text documents. Steganography may be a method and study of composing a secret communication specified only the source and also the targeted beneficiary will realize the concealed information. the information concealed or covered process starts with the steganography method by identifying a network canopy and redundant parts, i.e. only permitted persons would be able to change without affecting the standard of that medium. The encoding method generates a Stego medium by substituting these redundant bits with the concealed message content. In this report, various approaches for information hiding using both cryptography and steganography is proposed keeping in mind two considerations-size of the encrypted object and degree of security. Here, signature image, text, audio information is kept hidden into a cover image using the private key of sender and receiver, which extracts the data from stego image employing a public key. This approach is often used for message authentication, message integrity, and non-repudiation purpose.
Style APA, Harvard, Vancouver, ISO itp.
22

Wibisono, Gunawan, Tri Waluyo i Erik Iman Heri Ujianto. "KAJIAN METODE METODE STEGANOGRAFI PADA DOMAIN SPASIAL". JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, nr 2 (1.02.2020): 259–64. http://dx.doi.org/10.33480/jitk.v5i2.1212.

Pełny tekst źródła
Streszczenie:
This paper contains a review of the spatial domain steganographic literature. The purpose of this paper is to provide knowledge about techniques or methods that exist in the spatial domain of steganography. Steganography is the science or technique for hiding secret messages in other messages so that the existence of the secret message cannot be accessed by others who do not have authority. There are several popular spatial domains of steganographic techniques, namely LSB (Least Significant Bit), which is mapping secret message bits in the rightmost bit (LSB) of each color pixel and PVD (Pixel Value Differencing) which in this method offers a larger message storage capacity , with better image quality compared to other methods in the spatial domain. Because privacy issues continue to develop along with various digital communication technologies, and increasingly strong security threats, steganography can play a role in society to maintain the confidentiality of both picture, voice and video messages. For this reason it is important for us to be aware of steganographic technology and its implications.
Style APA, Harvard, Vancouver, ISO itp.
23

Heidari, Shahrokh, Mohammad Rasoul Pourarian, Reza Gheibi, Mosayeb Naseri i Monireh Houshmand. "Quantum red–green–blue image steganography". International Journal of Quantum Information 15, nr 05 (sierpień 2017): 1750039. http://dx.doi.org/10.1142/s0219749917500393.

Pełny tekst źródła
Streszczenie:
One of the most considering matters in the field of quantum information processing is quantum data hiding including quantum steganography and quantum watermarking. This field is an efficient tool for protecting any kind of digital data. In this paper, three quantum color images steganography algorithms are investigated based on Least Significant Bit (LSB). The first algorithm employs only one of the image’s channels to cover secret data. The second procedure is based on LSB XORing technique, and the last algorithm utilizes two channels to cover the color image for hiding secret quantum data. The performances of the proposed schemes are analyzed by using software simulations in MATLAB environment. The analysis of PSNR, BER and Histogram graphs indicate that the presented schemes exhibit acceptable performances and also theoretical analysis demonstrates that the networks complexity of the approaches scales squarely.
Style APA, Harvard, Vancouver, ISO itp.
24

Shahi, D., R. S. Vinod Kumar i V. K. Reshma. "High Capacity Reversible Steganography on CMY and HSI Color Images Using Image Interpolation". Webology 18, Special Issue 04 (30.09.2021): 133–48. http://dx.doi.org/10.14704/web/v18si04/web18119.

Pełny tekst źródła
Streszczenie:
Steganography using image interpolation has created a new research area in multimedia communication. A reversible data concealing in HSI and CMY color models using image interpolation is proposed in this paper. The HSI and CMY image models are interpolated using High Capacity Reversible Steganography (CRS) technique. The median plane of both HSI and CMY color models are selected for secret message bit concealing. The secret message bits are concealed in the cover plane by Exclusive OR (XOR) operation. Since the cover image is recovered after secret message bit retrieval, this finds application in military and medical imaging applications. The experimental results of proposed scheme showed very high embedding capacity of about 16 bits in each pixel location of calculated pixel value, good image quality with a surface similarity index measure (SSIM) value 1 and high PSNR. Also, high robustness is achieved on comparing with the existing works.
Style APA, Harvard, Vancouver, ISO itp.
25

Abdullah, Hikmat N., Sura F. Yousif i Alejandro A. Valenzuela. "Efficient Steganography Scheme for Color Images based on Wavelets and Chaotic Maps". Iraqi Journal of Information & Communications Technology 2, nr 4 (23.02.2020): 11–20. http://dx.doi.org/10.31987/ijict.2.4.86.

Pełny tekst źródła
Streszczenie:
In this paper, a combination of spatial domain as well as transformation domain with the aid of chaotic sequences is used to propose an efficient steganography scheme for color images. The transform domain uses Discrete Wavelet Transform (DWT) for embedding the cover and secret images. Chaotic sequences are used for two purposes: first, to scramble the secret color image before hiding. Second, to randomly select the locations of the cover image for embedding. The two images are then merged together into a single image and the stego image is formed by applying IDWT. The secret image is extracted from the stego image without the need to the original cover image. The simulation results are evaluated in terms of Mean Square Error (MSE), correlation, and Peak Signal to Noise Ratio (PSNR) demonstrate that the proposed scheme has better robustness than the previous schemes in the literature in the presence of common image attacks including filtering and noise attacks. The obtained results for maximum PSNR and correlation were 76.8 dB and 99.99% for the stego image while for the extracted secret image were 55.4 dB and 100%.
Style APA, Harvard, Vancouver, ISO itp.
26

Rahman, Shahid, Jamal Uddin, Hameed Hussain, Salman Jan, Inayat Khan, Muhammad Shabir i Shahrulniza Musa. "Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats". Sustainability 15, nr 5 (27.02.2023): 4252. http://dx.doi.org/10.3390/su15054252.

Pełny tekst źródła
Streszczenie:
The Internet and Big Data expansion have motivated the requirement for more generous stockpiling to hold and share information. Against the current era of information, guaranteeing protection and security to individuals sending data to each other is of utmost importance. The only file type that is instantly and widely used is the image. Therefore, to secure transmission, it is necessary to develop a mechanism to safeguard user data transmission. Considering this thought, it is necessary to analyze the best file type of image for essential criteria of image steganography, such as Payload, Robustness, Imperceptibility, etc., to challenge the weakness of the current algorithms. The widely used image formats are PNG, TIFF, JPEG, BMP, and GIF, which is the cause of existing methods. However, in this case, the critical softness is the credibility of the steganography, which plays a vital role in these format images to ensure the end users communicate. In this paper, a single algorithm provides several advantages for various types of images used as cover objects. However, after the critical and comparative analysis of different perspectives and some assessment metrics, the experimental results prove the importance, significance, and promising limits for these image formats by accomplishing a 4.4450% normal higher score for PSNR correlation than the next best existing methodology. Besides, in PSNR with a variable measure of code implanted in similar pictures of similar aspects, the proposed approach accomplished a 6.33% better score. Encrypting similar code sizes in pictures of various dimensions brought about a 4.23% better score. Embedding the same message size into the same dimension of different images resulted in a 3.222% better score.
Style APA, Harvard, Vancouver, ISO itp.
27

S, Hemalatha, Dinesh Acharya U, Renuka A i Priya R. Kamath. "A Secure Color Image Steganography in Transform Domain". International Journal on Cryptography and Information Security 3, nr 1 (31.03.2013): 17–24. http://dx.doi.org/10.5121/ijcis.2013.3103.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Zeng, Lu, Ning Yang, Xiang Li, Aidong Chen, Hongyuan Jing i Jiancheng Zhang. "Advanced Image Steganography Using a U-Net-Based Architecture with Multi-Scale Fusion and Perceptual Loss". Electronics 12, nr 18 (8.09.2023): 3808. http://dx.doi.org/10.3390/electronics12183808.

Pełny tekst źródła
Streszczenie:
Image-to-image steganography refers to the practice of hiding secret image within a cover image, serving as a crucial technique for secure communication and data protection. Existing image-to-image generative adversarial network-based steganographic methods for image hiding demonstrate a high embedding capacity. However, there is still significant room for improvement in terms of the quality of the stego images and the extracted secret images. In this study, we propose an architecture for inconspicuously hiding an image within the Y channel of another image, leveraging a U-Net network and a multi-scale fusion ExtractionBlock. The network is jointly trained using a loss function combining Perceptual Path Length (PPL) and Mean Square Error (MSE). The proposed network is trained and tested on two datasets, Labeled Faces in the Wild and Pascal visual object classes. Experimental results demonstrate that the model not only achieves high invisibility and significant hiding capacity (8 bits per pixel) without altering the color information of the cover image but also exhibits strong generalization ability. Additionally, we introduce the Modified Multi-Image Similarity Metric (MMISM), which integrates the Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM) values of images, to comprehensively evaluate the network’s hiding and extraction capabilities.
Style APA, Harvard, Vancouver, ISO itp.
29

Kan, O. A., N. A. Mazhenov, K. B. Kopbalina i G. B. Turebaeva. "Method for hiding text data in an image". Bulletin of the Innovative University of Eurasia 83, nr 1 (23.09.2021): 72–79. http://dx.doi.org/10.37788/2021-3/72-79.

Pełny tekst źródła
Streszczenie:
The main problem: The article deals with the issues of hiding text information in a graphic file. A formula for hiding text information in image pixels is proposed. A steganography scheme for embedding secret text in random image pixels has been developed. Random bytes are pre-embedded in each row of pixels in the source image. As a result of the operations performed, a key image is obtained. The text codes are embedded in random bytes of pixels of a given RGB channel. To form a secret message, the characters of the ASCII code table are used. Demo encryption and decryption programs have been developed in the Python 3.5.2 programming language. A graphic file is used as the decryption key. Purpose: To develop an algorithm for embedding text information in random pixels of an image. Methods: Among the methods of hiding information in graphic images, the LSB method of hiding information is widely used, in which the lower bits in the image bytes responsible for color encoding are replaced by the bits of the secret message. Analysis of methods of hiding information in graphic files and modeling of algorithms showed an increase in the level of protection of hidden information from detection. Results and their significance: Using the proposed steganography scheme and the algorithm for embedding bytes of a secret message in a graphic file, protection against detection of hidden information is significantly increased. The advantage of this steganography scheme is that for decryption, a key image is used, in which random bytes are pre-embedded. In addition, the entire pixel bits of the container image are used to display the color shades. It can also be noted that the developed steganography scheme allows not only to transmit secret information, but also to add digital fingerprints or hidden tags to the image.
Style APA, Harvard, Vancouver, ISO itp.
30

MISHRA, D. C., HIMANI SHARMA, R. K. SHARMA i NAVEEN KUMAR. "A FIRST CRYPTOSYSTEM FOR SECURITY OF TWO-DIMENSIONAL DATA". Fractals 25, nr 01 (luty 2017): 1750011. http://dx.doi.org/10.1142/s0218348x17500116.

Pełny tekst źródła
Streszczenie:
In this paper, we present a novel technique for security of two-dimensional data with the help of cryptography and steganography. The presented approach provides multilayered security of two-dimensional data. First layer security was developed by cryptography and second layer by steganography. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. This paper proposes a novel approach for encryption and decryption of information in the form of Word Data (.doc file), PDF document (.pdf file), Text document, Gray-scale images, and RGB images, etc. by using Vigenere Cipher (VC) associated with Discrete Fourier Transform (DFT) and then hiding the data behind the RGB image (i.e. steganography). Earlier developed techniques provide security of either PDF data, doc data, text data or image data, but not for all types of two-dimensional data and existing techniques used either cryptography or steganography for security. But proposed approach is suitable for all types of data and designed for security of information by cryptography and steganography. The experimental results for Word Data, PDF document, Text document, Gray-scale images and RGB images support the robustness and appropriateness for secure transmission of these data. The security analysis shows that the presented technique is immune from cryptanalytic. This technique further provides security while decryption as a check on behind which RGB color the information is hidden.
Style APA, Harvard, Vancouver, ISO itp.
31

Yang, Chunfang, Yuhan Kang, Fenlin Liu, Xiaofeng Song, Jie Wang i Xiangyang Luo. "Color image steganalysis based on embedding change probabilities in differential channels". International Journal of Distributed Sensor Networks 16, nr 5 (maj 2020): 155014772091782. http://dx.doi.org/10.1177/1550147720917826.

Pełny tekst źródła
Streszczenie:
It is a potential threat to persons and companies to reveal private or company-sensitive data through the Internet of Things by the color image steganography. The existing rich model features for color image steganalysis fail to utilize the fact that the content-adaptive steganography changes the pixels in complex textured regions with higher possibility. Therefore, this article proposes a variant of spatial rich model feature based on the embedding change probabilities in differential channels. The proposed feature is extracted from the residuals in the differential channels to reduce the image content information and enhance the stego signals significantly. Then, the embedding change probability of each element in the differential channels is added to the corresponding co-occurrence matrix bin to emphasize the interference of the residuals in textured regions to the improved co-occurrence matrix feature. The experimental results show that the proposed feature can significantly improve the detection performances for the WOW and S-UNIWARD steganography, especially when the payload size is small. For example, when the payload size is 0.05 bpp, the detection errors can be reduced respectively by 5.20% and 4.90% for WOW and S-UNIWARD by concatenating the proposed feature to the color rich model feature CRMQ1.
Style APA, Harvard, Vancouver, ISO itp.
32

L. Hussein, Hussein. "Hiding Data in Color Image Using Least Significant Bits of Blue Sector". Ibn AL- Haitham Journal For Pure and Applied Science 31, nr 2 (12.09.2018): 193. http://dx.doi.org/10.30526/31.2.1948.

Pełny tekst źródła
Streszczenie:
Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant bits of blue sector of the image.
Style APA, Harvard, Vancouver, ISO itp.
33

Tang, Lili, Dongrui Wu, Honghui Wang, Mingzhi Chen i Jialiang Xie. "An adaptive fuzzy inference approach for color image steganography". Soft Computing 25, nr 16 (2.05.2021): 10987–1004. http://dx.doi.org/10.1007/s00500-021-05825-y.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Hsieh, Ku-Sung, i Chung-Ming Wang. "Constructive image steganography using example-based weighted color transfer". Journal of Information Security and Applications 65 (marzec 2022): 103126. http://dx.doi.org/10.1016/j.jisa.2022.103126.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Liao, Xin, Yingbo Yu, Bin Li, Zhongpeng Li i Zheng Qin. "A New Payload Partition Strategy in Color Image Steganography". IEEE Transactions on Circuits and Systems for Video Technology 30, nr 3 (marzec 2020): 685–96. http://dx.doi.org/10.1109/tcsvt.2019.2896270.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Thanki, Rohit, i Surekha Borra. "A color image steganography in hybrid FRT–DWT domain". Journal of Information Security and Applications 40 (czerwiec 2018): 92–102. http://dx.doi.org/10.1016/j.jisa.2018.03.004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Astuti, E. Z., D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari i Md K. Sarker. "LSB-based Bit Flipping Methods for Color Image Steganography". Journal of Physics: Conference Series 1501 (marzec 2020): 012019. http://dx.doi.org/10.1088/1742-6596/1501/1/012019.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

El Rezen Purba, Doni, i Desinta Purba. "Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security". Jurnal Info Sains : Informatika dan Sains 11, nr 1 (1.03.2021): 1–4. http://dx.doi.org/10.54209/infosains.v11i1.18.

Pełny tekst źródła
Streszczenie:
For a secret message to be read and understood by a specific person only, a way is needed to hide the message, namely by steganography. Steganography is the concealment of secret messages in other media, such as images, audio, or video, so that the media inserted into the message looks as usual. Digital photos are one of the container media that are widely used for data hiding. However, when processing images such as compression, rotation, noise, and so on, confidential messages in the picture are prone to damage or loss. Then it takes the correct steganography method to hide secret messages into images to keep messages safe, not damaged even if the container image is manipulated, and the hidden message can be extracted again. on this thesis, applied masking method – filtering. Masking-filtering is included in the spatial domain. Message hiding is done by manipulating the luminance value of the image. Its use is applied to color or grayscale images. Masking serves as a tagging place on the picture that can be inserted message. Filtering passes a value to the marked section. the result is a stego image where the news is integrated with the container image, more robust to image processing when compared to methods that are also classified in the spatial domain, such as the least significant bit.
Style APA, Harvard, Vancouver, ISO itp.
39

Abbass, Ahmed Abdulrudah, Salam Al-augby, Hussein Lafta Hussein, Jasim Hussein Kaabi i Robert Tornai. "American standard code for information interchange mapping technique for text hiding in the RGB and gray images". International Journal of Electrical and Computer Engineering (IJECE) 12, nr 3 (1.06.2022): 2812. http://dx.doi.org/10.11591/ijece.v12i3.pp2812-2817.

Pełny tekst źródła
Streszczenie:
<span>One of the significant techniques for hiding important information (such as text, image, and audio) is steganography. Steganography is used to keep this information as secret as possible, especially the sensitive ones after the massive expansion of data transmission through the Internet inside a conventional, non-secret, file, or message. This paper uses the American standard code for information interchange (ASCII) mapping technique (AMT) to hide the data in the color and grey image by converting it in a binary form, also convert the three levels of the red, green, and blue (RGB) image and grey image in the binary form, and then hide the data through hiding every two bits of the text in the two bits of one of the levels from the RGB image and grey image that means the text will be distributed throughout the images and allows hiding large amounts of data. That will send the information in a good securing way.</span>
Style APA, Harvard, Vancouver, ISO itp.
40

Hindi, A. Y., M. O. Dwairi i Z. A. AlQadi. "A Novel Technique for Data Steganography". Engineering, Technology & Applied Science Research 9, nr 6 (1.12.2019): 4942–45. http://dx.doi.org/10.48084/etasr.2955.

Pełny tekst źródła
Streszczenie:
In this paper, a novel stego-method will be introduced, which can be used to hide any secret message in any holding color image. The proposed method will be implemented and tested and the calculated parameters will be compared with the LSB method parameters. It will be shown that the proposed method provides a high-security level by using two keys to extract the secret message from the holding image, making it very difficult to hack.
Style APA, Harvard, Vancouver, ISO itp.
41

Alqadi, Ziad, i Mohammad S. Khrisat. "DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY". International Journal of Engineering Technologies and Management Research 7, nr 9 (21.09.2020): 31–38. http://dx.doi.org/10.29121/ijetmr.v7.i9.2020.782.

Pełny tekst źródła
Streszczenie:
LSB2 method of data steganography is one of the most popular methods used to hide secret messages in digital color image. This method keeps the quality of the holding image high but it is not secure and it can be easily hacked. In this paper a method of improving the security of LSB2 method will be proposed, tested and implemented. The added security issues are simple and do require extra memory and time for execution. An embedded key will be extracted from the holding image to encrypt the message, this key will be variable and depends on the selected covering image, selected message length and selected position in the image where to extract the embedded key; the selected position and message length will form a private key to enhance LSB2 security.
Style APA, Harvard, Vancouver, ISO itp.
42

Jamila, Harbi S., i Nabeel N. Zeyad. "Steganography Based Human Skin Using Wavelet Transformation in RGB Image". International Letters of Chemistry, Physics and Astronomy 52 (czerwiec 2015): 84–89. http://dx.doi.org/10.18052/www.scipress.com/ilcpa.52.84.

Pełny tekst źródła
Streszczenie:
Steganography is the art and science that enables you to hide the data in certain communication such as (video, Audio, and image). Here it doesn't scramble the data and send it, but we hide it using a color image to hide the data at the Human skin color and doing that using the cropping phrase to get the required area to hide data. In this paper, we will use the Wavelet and slant, let to process the hiding in the blue band of the RGB image and apply the DWT (discrete wavelet transformation) to get the decomposed bounds of the Cover image to use it to hide the data of the (stage) image.
Style APA, Harvard, Vancouver, ISO itp.
43

Jamila, Harbi S., i Nabeel N. Zeyad. "Steganography Based Human Skin Using Wavelet Transformation in RGB Image". International Letters of Chemistry, Physics and Astronomy 52 (2.06.2015): 84–89. http://dx.doi.org/10.56431/p-o4ftbc.

Pełny tekst źródła
Streszczenie:
Steganography is the art and science that enables you to hide the data in certain communication such as (video, Audio, and image). Here it doesn't scramble the data and send it, but we hide it using a color image to hide the data at the Human skin color and doing that using the cropping phrase to get the required area to hide data. In this paper, we will use the Wavelet and slant, let to process the hiding in the blue band of the RGB image and apply the DWT (discrete wavelet transformation) to get the decomposed bounds of the Cover image to use it to hide the data of the (stage) image.
Style APA, Harvard, Vancouver, ISO itp.
44

Pan, Yi-Lun, i Ja-Ling Wu. "Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images". Entropy 24, nr 7 (15.07.2022): 982. http://dx.doi.org/10.3390/e24070982.

Pełny tekst źródła
Streszczenie:
Steganography is one of the most crucial methods for information hiding, which embeds secret data on an ordinary file or a cover message for avoiding detection. We designed a novel rate-distortion-based large-capacity secure steganographic system, called rate-distortion-based Stego (RD-Stego), to effectively solve the above requirement. The considered effectiveness of our system design includes embedding capacity, adaptability to chosen cover attacks, and the stability of the trained model. The proposed stego scheme can hide multiple three-channel color images and QR codes within another three-channel color image with low visual distortion. Empirically, with a certain degree of robustness against the chosen cover attack, we state that the system offers up to 192+ bits-per-pixel (bpp) embedding of a payload and leaks no secret-related information. Moreover, to provide theoretical foundations for our cost function design, a mutual information-based explanation of the choices of regulation processes is herein included. Finally, we justify our system’s claimed advantages through a series of experiments with publicly available benchmark datasets.
Style APA, Harvard, Vancouver, ISO itp.
45

Allah, M. I. Fath. "Chaos Based Stego Color Image Encryption". Journal of Cybersecurity and Information Management 10, nr 2 (2022): 08–18. http://dx.doi.org/10.54216/jcim.100201.

Pełny tekst źródła
Streszczenie:
Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, image encryption has become played a vital rule in information security. Many image encryption schemes have been proposed but most of them suffer from poor robustness against severe types of attacks. In this paper two proposed techniques will be presented for color image encryption to be robust to severe attacks: composite attack. One of these approaches is represented by hybrid use of both steganography and Discrete Wavelet Transform (DWT) based encryption and the other one in which Fractional Fast Fourier Transform (FRFFT) has been used with DWT. Not only new techniques will be presented but also a new chaotic map has been used as random keys for both algorithms. After extensive comparative study with some traditional techniques, it has been found that the proposed algorithms have achieved better performance.
Style APA, Harvard, Vancouver, ISO itp.
46

Zaini, H. G. "Image Segmentation to Secure LSB2 Data Steganography". Engineering, Technology & Applied Science Research 11, nr 1 (6.02.2021): 6632–36. http://dx.doi.org/10.48084/etasr.3859.

Pełny tekst źródła
Streszczenie:
A digital color image usually has a high resolution, thus its size is good enough and the image can be used as a covering (holding) image to hide secrete messages (short and long). The methods commonly used for data steganography, e.g. LSB and LSB2 are not secure, so in this paper, a method of securing the LSB2 method is proposed. The proposed method is based on wavelet packet decomposition. The levels of decomposition will be kept in secret and one of the resulting segments will be used as a covering segment. MSE, PSNR, hiding time, and extraction time will be experimentally analyzed to prove that the proposed method is capable of handling the process of hiding secret messages, either sort or long.
Style APA, Harvard, Vancouver, ISO itp.
47

Al-Kadei, Faten H. MohammedSediq. "Two-level hiding an encrypted image". Indonesian Journal of Electrical Engineering and Computer Science 18, nr 2 (1.05.2020): 961. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp961-969.

Pełny tekst źródła
Streszczenie:
<p><span>Encryption and hiding images are becoming a hot research area and a broad prospect for application. This article uses a secure algorithm with Low Significant Bit method to hide an encrypted high-resolution color bitmap image in two selectively color images (i.e., two cover images). The paper introduces a two-level hiding encrypted image using MATLAB-GUI programming language. In the beginning, with a key image using XOR bit operation, the original RGB image is encrypted. After that, the encrypted image is hidden into the first cover image. The cover image is then hidden into another cover to make the secret image safer without changing the perceptual quality for both covers. Then, the algorithm is tested on many bitmap images, which can be an important image, fingerprint image, samples of secret medicine, or bank account pattern. The correlation histograms demonstrate a high correlation for all encrypted images. The PSNR is used to find steganography quality for the two cover images after hiding the secret image showing a high quality for the two levels of hiding operation</span></p>
Style APA, Harvard, Vancouver, ISO itp.
48

Khaleel, Yazen A. "High Security and Capacity of Image Steganography for Hiding Human Speech Based on Spatial and Cepstral Domains". ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 8, nr 1 (28.06.2020): 95. http://dx.doi.org/10.14500/aro.10670.

Pełny tekst źródła
Streszczenie:
A new technique of hiding a speech signal clip inside a digital color image is proposed in this paper to improve steganography security and loading capacity. The suggested technique of image steganography is achieved using both spatial and cepstral domains, where the Mel-frequency cepstral coefficients (MFCCs) are adopted, as very efficient features of the speech signal. The presented technique in this paper contributes to improving the image steganography features through two approaches. First is to support the hiding capacity by the usage of the extracted MFCCs features and pitches extracted from the speech signal and embed them inside the cover color image rather than directly hiding the whole samples of the digitized speech signal. Second is to improve the data security by hiding the secret data (MFCCs features) anywhere in the host image rather than directly using the least significant bits substitution of the cover image. At the recovering side, the proposed approach recovers these hidden features and using them to reconstruct the speech waveform again by inverting the steps of MFCCs extraction to recover an approximated vocal tract response and combine it with recovered pitch based excitation signal. The results show a peak signal to noise ratio of 52.4 dB of the stego-image, which reflect a very good quality and a reduction ratio of embedded data to about (6%–25%). In addition, the results show a speech reconstruction degree of about 94.24% correlation with the original speech signal.
Style APA, Harvard, Vancouver, ISO itp.
49

M.K, Shyla. "Center Pixel Based Robust Color Image Steganography for IoT Applications". Bioscience Biotechnology Research Communications 13, nr 13 (25.12.2020): 165–70. http://dx.doi.org/10.21786/bbrc/13.13/23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Jalal Yousif, Adel. "Image Steganography Based on Wavelet Transform and Color Space Approach". Diyala Journal of Engineering Sciences 13, nr 3 (1.09.2020): 23–34. http://dx.doi.org/10.24237/djes.2020.13303.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii