Information hiding is an important technique for information security, which is wildly studied by researchers. Recently embedding methods are proposed in spatial, frequency and other domains. After investigating previous literatures, we find that there is still room for embedding performance improvement. Inspired by some literatures, we propose a new method (Modulus Calculations on Prime Number Algorithm, MOPNA) for embedding secret data into cover-images. The main idea of MOPNA is hiding confidential data in paired cover-pixels with modulus calculation based on weight parameters consisting of prime numbers. MOPNA improves the embedding capacity while maintaining good stego-image quality. The correctness of MOPNA method is proved by a combi...
Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhan...
In this paper, we shall propose a new image steganographic technique capable of producing a secret-e...
Copyright © 2013 Yanping Zhang et al. This is an open access article distributed under the Creative ...
Steganography refers to the process of hiding secret message inside an appropriate multimedia carrie...
AbstractSteganography is the only answer for secure and secret communication. Existing methods in im...
Presenting a novel message embedding algorithm using the optimal weighted modulus.Systematically pro...
This new technique will use modulus arithmetic to incorporate secret-information into a host-image. ...
Data hiding is one of the challenging issues in the field of network security. Unlike cryptography, ...
[[abstract]]The simple least-significant-bit (LSB) substitution technique is the easiest way to embe...
[[abstract]]In this paper, we shall propose a novel image-hiding scheme. Our new scheme classifies t...
Steganography is a process that involves hiding a message in an appropriate carrier like image or au...
In this paper, a few novel data hiding techniques are proposed. These tech-niques are improvements o...
[[abstract]]In this paper, we shall propose a new image steganographic technique capable of producin...
Preventing secret from being suspicious during transferring over Internet has become an emergent iss...
[[abstract]]High embedding capacity and low image distortion factors are main concerns of informatio...
Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhan...
In this paper, we shall propose a new image steganographic technique capable of producing a secret-e...
Copyright © 2013 Yanping Zhang et al. This is an open access article distributed under the Creative ...
Steganography refers to the process of hiding secret message inside an appropriate multimedia carrie...
AbstractSteganography is the only answer for secure and secret communication. Existing methods in im...
Presenting a novel message embedding algorithm using the optimal weighted modulus.Systematically pro...
This new technique will use modulus arithmetic to incorporate secret-information into a host-image. ...
Data hiding is one of the challenging issues in the field of network security. Unlike cryptography, ...
[[abstract]]The simple least-significant-bit (LSB) substitution technique is the easiest way to embe...
[[abstract]]In this paper, we shall propose a novel image-hiding scheme. Our new scheme classifies t...
Steganography is a process that involves hiding a message in an appropriate carrier like image or au...
In this paper, a few novel data hiding techniques are proposed. These tech-niques are improvements o...
[[abstract]]In this paper, we shall propose a new image steganographic technique capable of producin...
Preventing secret from being suspicious during transferring over Internet has become an emergent iss...
[[abstract]]High embedding capacity and low image distortion factors are main concerns of informatio...
Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhan...
In this paper, we shall propose a new image steganographic technique capable of producing a secret-e...
Copyright © 2013 Yanping Zhang et al. This is an open access article distributed under the Creative ...