Results 1 to 10 of about 14,292 (271)

Edge-based image steganography [PDF]

open access: yesEURASIP Journal on Information Security, 2014
This paper proposes a novel steganography technique, where edges in the cover image have been used to embed messages. Amount of data to be embedded plays an important role on the selection of edges, i.e., the more the amount of data to be embedded, larger the use of weaker edges for embedding. Experimental results have shown that the proposed technique
Islam, Saiful   +2 more
openaire   +1 more source

Convolutional Neural Network Steganalysis's Application to Steganography

open access: yes, 2017
This paper presents a novel approach to increase the performance bounds of image steganography under the criteria of minimizing distortion. The proposed approach utilizes a steganalysis convolutional neural network (CNN) framework to understand an image ...
Agarwal, Chirag   +3 more
core   +1 more source

Image vaccine against steganography in encrypted domain

open access: yesScientific Reports
This paper investigates on the defense against steganography, and the overall purpose of the study is to design a satisfactory defense scheme in encrypted domain.
Xinran Li, Zichi Wang
doaj   +1 more source

Universal Image Steganalytic Method [PDF]

open access: yes, 2014
In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting well-known and also newly developed steganographic methods.
Banoci, V.   +3 more
core   +1 more source

A Novel LSB Steganography Technique Using Image Segmentation [PDF]

open access: yesJournal of Universal Computer Science
Steganography is a process to hide data inside a cover file mostly used in media files like image, video, and audio files. Least significant bit (LSB) steganography is a technique where the least significant bits of pixels are used for information hiding.
Yasir Yakup Demircan, Serhat Ozekes
doaj   +3 more sources

Unsupervised Steganalysis Based on Artificial Training Sets

open access: yes, 2016
In this paper, an unsupervised steganalysis method that combines artificial training setsand supervised classification is proposed. We provide a formal framework for unsupervisedclassification of stego and cover images in the typical situation of ...
Lerch-Hostalot, Daniel, Megías, David
core   +1 more source

PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2015
One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography.
R. Rejani, D. Murugan, Deepu V. Krishnan
doaj  

Perfectly secure steganography: hiding information in the quantum noise of a photograph

open access: yes, 2015
We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now.
Lavoie, Jonathan   +4 more
core   +2 more sources

Is image steganography natural? [PDF]

open access: yesIEEE Transactions on Image Processing, 2005
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. We experimentally investigate if stego-images, bearing a secret message, are statistically "natural." For this purpose, we use recent results on the statistics of natural images and investigate the effect of some ...
Alvaro, Martín   +2 more
openaire   +2 more sources

Steganography based on parameters’ disturbance of spatial image transform

open access: yesTongxin xuebao, 2017
In the research of state-of-the-art steganography algorithms,most of image sources were natural images in laboratory environment.However,with the rapid development of image process tools and applications,images after image processing were widely used in ...
Xi SUN   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy