Results 261 to 270 of about 15,292 (300)
Some of the next articles are maybe not open access.

Image Steganography and Chrominance Components

2010 10th IEEE International Conference on Computer and Information Technology, 2010
Digital images are the most common cover files used for steganography. This paper investigates the pros and cons of colour and grayscale versions of images when used as steganography covers. Therefore, it comparatively evaluates the performance of both grayscale and colour versions of a given cover image when they are used with a given steganography ...
Adel Almohammad, Gheorghita Ghinea
openaire   +1 more source

IIS: Implicit Image Steganography

2014
In steganography secrets are imposed inside the cover medium either by replacing bits in the spatial domain or changing the frequency domain. Instead the proposed Implicit Image Steganography (IIS) scheme does not alter or replace bits in the original cover image for hiding information.
K. Jithesh, P. Babu Anto, V. Thavavel
openaire   +1 more source

A New Payload Partition Strategy in Color Image Steganography

IEEE transactions on circuits and systems for video technology (Print), 2020
In traditional steganographic schemes, RGB three channels payloads are assigned equally in a true color image. In fact, the security of color image steganography relates not only to data-embedding algorithms but also to different payload partition.
Xin Liao   +4 more
semanticscholar   +1 more source

Steganography based on image morphing

2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013), 2013
Nowadays, large scale data-centers have been built around the world, and cloud computing is becoming more and more popular. With the help of cloud computing, users can access their data and obtain different services anywhere and anytime. However, many people and companies still hesitate to use cloud based services because of the information security ...
Qiangfu Zhao, Tosiyasu L. Kunii
openaire   +1 more source

Steganography in JPEG2000 compressed images

IEEE Transactions on Consumer Electronics, 2003
Information hiding in JPEG2000 compressed images is investigated in this research. The challenges of covert communication in this state-of-the-art image codec are analyzed and a steganographic scheme is then proposed to reliably embed high-volume data into the JPEG2000 bit-stream.
Po-Chyi Su, C.-C. Jay Kuo
openaire   +1 more source

Fractal based image steganography

1996
This paper describes a new and novel steganographic method for inserting secret information into image files. The method uses fractal image compression techniques in the production of these steganographic image files. The method allows a user to specify a visual key when hiding the secret information.
Paul Davern, Michael Scott
openaire   +1 more source

Image Processing with Android Steganography

2015
Digital Steganography is a technique that provides confidential communications between two parties via Internet and Mobile Networks. This paper proposes a new solution of digital steganography based on Android operating system. The proposed method uses an improved LSB technique by a random selection function and has as cover BMP files. Image processing
Dominic Bucerzan, Crina Ratiu
openaire   +1 more source

Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages

IEEE Transactions on Network Science and Engineering
With the rapid development of internet applications, privacy protection of secret messages in covert communication has become increasingly important.
Wenying Wen   +4 more
semanticscholar   +1 more source

Image Steganography Optimization Technique

2012
This paper presents a novel steganography technique which combines Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). The objective is to maximize the capacity and invisibility of the secret image with minimal modification to the cover image (at most k-bits per block). The secret image is transformed to frequency domain using DCT.
Bassam Jamil Mohd   +3 more
openaire   +1 more source

StegIm: Image in Image Steganography

2022
Ivo Tasevski   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy