scispace - formally typeset
Proceedings ArticleDOI

Steganography effects in various formats of images. A preliminary study

Reads0
Chats0
TLDR
The effects of steganography in different image formats (BMP, GIF, JPEG and DWT coded) are studied to give an answer to the questions how many bits of noise can be injected without perceptually deteriorating the quality of the image.
Abstract
In this paper, the effects of steganography in different image formats (BMP, GIF, JPEG and DWT coded) are studied. With respect to these formats, we try to give an answer to the following questions. (1) How many bits of noise (i.e. the textual secret message) can be injected without perceptually deteriorating the quality of the image? (2) How and where should one inject these bits in order to achieve the best trade-off in terms of the length of the textual message and the preserved quality of the image?.

read more

Citations
More filters
Proceedings ArticleDOI

Authentication of secret information in image Steganography

TL;DR: This paper proposes an image steganography that can verify the reliability of the information being transmitted to the receiver and uses two special AC coefficients of the discrete wavelet transform domain to verify the veracity (integrity) of the secret information from the stego image.
Book ChapterDOI

Digital Image Steganography Based on Combination of DCT and DWT

Vijay Kumar, +1 more
TL;DR: Experimental results demonstrate that combining the two transforms improves the performance of the steganography technique in terms of PSNR value and the performance is better as compared to that achieved using DWT transform only.
Proceedings ArticleDOI

Image Steganography and Chrominance Components

TL;DR: This paper comparatively evaluates the performance of both grayscale and colour versions of a given cover image when they are used with a given steganography method, and examines the capability and impact of using the chrominance components for data hiding.
Journal ArticleDOI

Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding

TL;DR: A public-key image hiding scheme is proposed to offer safe exchange of a stego image on the Internet and has two advantages compared with other data hiding techniques: one is the high safety and convenience offered by the RSA system to exchange data on theInternet, and the other is that the stegO image can pass through high-quality Joint Photograph Experts Group (JPEG) compression without noticeable degradation.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

The JPEG still picture compression standard

TL;DR: The Baseline method has been by far the most widely implemented JPEG method to date, and is sufficient in its own right for a large number of applications.
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

Exploring steganography: Seeing the unseen

Johnson, +1 more
- 01 Jan 1998 -