A novel adaptive steganographic scheme for spatial image is proposed. A noisy function is used to measure texture complexity of 2 × 2 pixel blocks, which keeps monotonic increasing after ±1 modifications. Therefore, the message is embedded into the noisiest areas and the recipient can identify the embedding region. The ‘double-layered embedding ’ is exploited to reduce the number of ±1 modifications, in which the fast matrix embedding and wet paper codes are applied to the least significant bit (LSB) plane and the second LSB plane, respectively. The experiments on resisting three steganalyzers show that the proposed method performs better than four typical steganographic schemes. Moreover, comparing with the extended highly undetectable ste...
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secu...
Steganography is the art of hiding a secret message in different kind of multimedia (image, voice or...
Abstract—This research paper proposes a secured, robust approach of information security using stega...
A novel adaptive steganographic scheme for spatial image is proposed. A noisy function is used to me...
Generally, the steganographic algorithm randomly selects adequate pixels for data embedding, and the...
In this paper, a steganography technique using LSB substitution and PVD method is presented as an ad...
International audienceIn this paper, we propose a chaos-based enhancement of two spatial steganograp...
is a popular type of Steganography algorithms in the spatial domain. The least-significant-bit (LSB)...
Abstract—The least-significant-bit (LSB)-based approach is a popular type of steganographic algorith...
Abstract—According to the analysis of the effect of the texture complexity on steganalysis, we propo...
International audienceIn this paper we propose a chaos-based enhancement of two spatial steganograph...
학위논문 (석사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2012. 2. No, Jong-Seon.Low distortion and high embedding capacity...
[[abstract]]This paper proposes a new adaptive least-significant- bit (LSB) steganographic method us...
With the rapid development of modern computer technology and network communication technology, infor...
In this paper, a content-adaptive steganographic scheme is proposed. The novel scheme can be viewed ...
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secu...
Steganography is the art of hiding a secret message in different kind of multimedia (image, voice or...
Abstract—This research paper proposes a secured, robust approach of information security using stega...
A novel adaptive steganographic scheme for spatial image is proposed. A noisy function is used to me...
Generally, the steganographic algorithm randomly selects adequate pixels for data embedding, and the...
In this paper, a steganography technique using LSB substitution and PVD method is presented as an ad...
International audienceIn this paper, we propose a chaos-based enhancement of two spatial steganograp...
is a popular type of Steganography algorithms in the spatial domain. The least-significant-bit (LSB)...
Abstract—The least-significant-bit (LSB)-based approach is a popular type of steganographic algorith...
Abstract—According to the analysis of the effect of the texture complexity on steganalysis, we propo...
International audienceIn this paper we propose a chaos-based enhancement of two spatial steganograph...
학위논문 (석사)-- 서울대학교 대학원 : 전기·컴퓨터공학부, 2012. 2. No, Jong-Seon.Low distortion and high embedding capacity...
[[abstract]]This paper proposes a new adaptive least-significant- bit (LSB) steganographic method us...
With the rapid development of modern computer technology and network communication technology, infor...
In this paper, a content-adaptive steganographic scheme is proposed. The novel scheme can be viewed ...
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secu...
Steganography is the art of hiding a secret message in different kind of multimedia (image, voice or...
Abstract—This research paper proposes a secured, robust approach of information security using stega...