Book ChapterDOI
Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision
V. Thanikaiselvan,Pachiyappan Arulmozhivarman,Rengarajan Amirtharajan,John Bosco Balaguru Rayappan +3 more
- pp 212-221
TLDR
This paper elucidates the use of Haar Integer Wavelet Transform for Constant and Adaptive number of bit embedding method and finds the method with the highest embedding capacity with high PSNR is adjudged best.Abstract:
Image steganography is a rapidly developing field with immense applications to offer high data security. There are two types’ or rather two domains in which image steganography has been achieved, spatial and frequency domain. Spatial domain steganography focuses on embedding of the payload on the LSB bits of the pixels on the image, while frequency domain steganography focuses on the transformation of the image pixels using various transform algorithms and then embedding data in the transformed pixels. The most commonly used transform mechanism is the IWT (Integer Wavelet Transform) because of the obvious reason that it yields integer coefficients which are very easy to work with. This paper elucidates the use of Haar Integer Wavelet Transform for Constant and Adaptive number of bit embedding method. Both types are analyzed and finally the method with the highest embedding capacity with high PSNR is adjudged best.read more
Citations
More filters
Journal ArticleDOI
A Graph Theory Practice on Transformed Image: A Random Image Steganography
TL;DR: The proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients.
Journal ArticleDOI
Image Encryption: An Information Security Perceptive
Journal ArticleDOI
Galois Field Proficient Product for Secure Image Encryption on FPGA
References
More filters
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Book
Information Hiding Techniques for Steganography and Digital Watermarking
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Journal ArticleDOI
Hiding data in images by simple LSB substitution
Chi-Kwong Chan,Lee-Ming Cheng +1 more
TL;DR: By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stega-image can be greatly improved with low extra computational complexity.
Journal ArticleDOI
Review: Digital image steganography: Survey and analysis of current methods
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI
Hide and seek: an introduction to steganography
Niels Provos,Peter Honeyman +1 more
TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.