Proceedings ArticleDOI
Steganography effects in various formats of images. A preliminary study
Giuseppe Mastronardi,Marcello Castellano,Francescomaria Marino +2 more
- pp 116-119
Reads0
Chats0
TLDR
The effects of steganography in different image formats (BMP, GIF, JPEG and DWT coded) are studied to give an answer to the questions how many bits of noise can be injected without perceptually deteriorating the quality of the image.Abstract:
In this paper, the effects of steganography in different image formats (BMP, GIF, JPEG and DWT coded) are studied. With respect to these formats, we try to give an answer to the following questions. (1) How many bits of noise (i.e. the textual secret message) can be injected without perceptually deteriorating the quality of the image? (2) How and where should one inject these bits in order to achieve the best trade-off in terms of the length of the textual message and the preserved quality of the image?.read more
Citations
More filters
Proceedings ArticleDOI
Authentication of secret information in image Steganography
TL;DR: This paper proposes an image steganography that can verify the reliability of the information being transmitted to the receiver and uses two special AC coefficients of the discrete wavelet transform domain to verify the veracity (integrity) of the secret information from the stego image.
Book ChapterDOI
Digital Image Steganography Based on Combination of DCT and DWT
Vijay Kumar,Dinesh Kumar +1 more
TL;DR: Experimental results demonstrate that combining the two transforms improves the performance of the steganography technique in terms of PSNR value and the performance is better as compared to that achieved using DWT transform only.
Proceedings ArticleDOI
Image Steganography and Chrominance Components
TL;DR: This paper comparatively evaluates the performance of both grayscale and colour versions of a given cover image when they are used with a given steganography method, and examines the capability and impact of using the chrominance components for data hiding.
Journal ArticleDOI
Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding
Wen Yuan Chen,Chin-Hsing Chen +1 more
TL;DR: A public-key image hiding scheme is proposed to offer safe exchange of a stego image on the Internet and has two advantages compared with other data hiding techniques: one is the high safety and convenience offered by the RSA system to exchange data on theInternet, and the other is that the stegO image can pass through high-quality Joint Photograph Experts Group (JPEG) compression without noticeable degradation.
References
More filters
Book
The Art of Computer Programming
TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI
The JPEG still picture compression standard
TL;DR: The Baseline method has been by far the most widely implemented JPEG method to date, and is sufficient in its own right for a large number of applications.
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Journal ArticleDOI
Information hiding-a survey
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.