scispace - formally typeset
Book ChapterDOI

Review on Image Steganography Transform Domain Techniques

TLDR
In this article , the authors proposed a steganography method to hide the existence of the data using the image as the cover image and the parameters Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), and Structured Similarity Index Measure (SSIM) are calculated.
Abstract
In today’s society, data security is of the utmost importance. Securing data by ensuring confidentiality and integrity is crucial. Security of information is essential for transferring confidential data, data storing, and database systems. Steganography is one of the methods of protecting data. As you can see, steganography is the art and science of concealing communication, i.e., encasing the secret message inside another medium, such as images, audio, video, or text. Steganography is a method with several advantages, including high concealment capacity and undetectability. There are different types of steganography. The type of steganography depends on the type of cover object such as text, image, video we use to conceal the secret. Image steganography is hiding the existence of the data using the image as the cover image. Lastly, the parameters Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), and Structured Similarity Index Measure (SSIM) are calculated which give an indication of the efficiency of the proposed method.

read more

Content maybe subject to copyright    Report

References
More filters
Journal ArticleDOI

A secure image steganography algorithm based on least significant bit and integer wavelet transform

TL;DR: A secure steganography algorithm that hides a bitstream of the secret text into the least significant bits of the approximation coefficients of the integer wavelet transform of grayscale images as well as each component of color images to form stego-images is proposed.
Proceedings ArticleDOI

Image steganography using discrete fractional Fourier transform

TL;DR: The advantage of discrete fractional Fourier transform (DFrFT) as compared to other transforms for steganography in image processing is illustrated.
Proceedings ArticleDOI

An improved secure image hiding technique using PN-sequence based on DCT-OTP

TL;DR: This paper proposed a combination of steganography and cryptography by using Discrete Cosine Transform (DCT), One Time Pad (OTP) and PN-Sequence implemented on a digital image to produce a better security system.
Proceedings ArticleDOI

Image Steganography Using Combine of Discrete Wavelet Transform and Singular Value Decomposition for More Robustness and Higher Peak Signal Noise Ratio

TL;DR: The result of this experiment showed that combine of Discrete Wavelet Transform and Singular Value Decomposition performance is better than the Least Significant Bit, Discrete Cosine Transform, and Discrete wavelet Transform using Peak Signal Noise Ratio and Mean Squared Error.
Proceedings ArticleDOI

A novel image steganography method based on DCT and LSB

TL;DR: An efficient image steganography algorithm to embed the secret image in the cover image using LSB substitution method that reduces the possibility of its detection by the human visual system (HVS) and steganalysis techniques.