To see the other types of publications on this topic, follow the link: LSB and DCT.

Journal articles on the topic 'LSB and DCT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'LSB and DCT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yunus, Mahmuddin, and Agus Harjoko. "Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, no. 1 (2014): 81. http://dx.doi.org/10.22146/ijccs.3498.

Full text
Abstract:
AbstrakPenyembunyian data pada file video dikenal dengan istilah steganografi video. Metode steganografi yang dikenal diantaranya metode Least Significant Bit (LSB) dan Discrete Cosine Transform (DCT). Dalam penelitian ini dilakukan penyembunyian data pada file video dengan menggunakan metode LSB, metode DCT, dan gabungan metode LSB-DCT. Sedangkan kualitas file video yang dihasilkan setelah penyisipan dihitung dengan menggunakan Mean Square Error (MSE) dan Peak Signal to Noise Ratio (PSNR).Uji eksperimen dilakukan berdasarkan ukuran file video, ukuran file berkas rahasia yang disisipkan, dan resolusi video.Hasil pengujian menunjukkan tingkat keberhasilan steganografi video dengan menggunakan metode LSB adalah 38%, metode DCT adalah 90%, dan gabungan metode LSB-DCT adalah 64%. Sedangkan hasil perhitungan MSE, nilai MSE metode DCT paling rendah dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan metode LSB-DCT mempunyai nilai yang lebih kecil dibandingkan metode LSB. Pada pengujian PSNR diperoleh databahwa nilai PSNR metode DCTlebih tinggi dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan nilai PSNR metode gabungan LSB-DCT lebih tinggi dibandingkan metode LSB. Kata Kunci—Steganografi, Video, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) AbstractHiding data in video files is known as video steganography. Some of the well known steganography methods areLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) method. In this research, data will be hidden on the video file with LSB method, DCT method, and the combined method of LSB-DCT. While the quality result of video file after insertion is calculated using the Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The experiments were conducted based on the size of the video file, the file size of the inserted secret files, and video resolution.The test results showed that the success rate of the video steganography using LSB method was 38%, DCT method was 90%, and the combined method of LSB-DCT was 64%. While the calculation of MSE, the MSE method DCT lower than the combined method of LSB and LSB-DCT method. While LSB-DCT method has asmaller value than the LSB method. The PNSR experiment showed that the DCT method PSNR value is higher than the combined method of LSB and LSB-DCT method. While PSNR combined method LSB-DCT higher compared LSB method. Keywords—Steganography, Video, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR)
APA, Harvard, Vancouver, ISO, and other styles
2

Nkuna, M.C., E. Esenogho, and R. Heymann. "Using Artificial Neural Network to Analyze Stego Images." Nigerian Research Journal of Engineering and Environmental Sciences 6, no. 2 (2021): 476–82. https://doi.org/10.5281/zenodo.5805077.

Full text
Abstract:
<em>This paper proposed a discrete cosine transform least significant Bit-2 steganography encryption method for embedding the secret data in the cover image. The method overcomes physical signs of pixel modifications while achieving a high data payload. This technique enables data to be hidden in a cover image, while the image recognition artificial neural network checks the presence of any visible alterations on the stego-image. The traditional least significant bit (LSB) and the proposed discrete cosine transform least significant bit-2 (DCT LSB-2) methods were tested for embedding efficiency. The stego-images obtained from the embedding process using the traditional LSB and the proposed DCT LSB-2 encoding algorithms were analyzed using a neural network. Results obtained from the proposed DCT LSB-2 method achieved high data payload and simultaneously minimized visible alterations, and maintained the efficiency of the neural network compared with the traditional LSB. The proposed method has shown an improved stego-system compared to traditional LSB techniques.</em>
APA, Harvard, Vancouver, ISO, and other styles
3

Savale, Vaishali, and Tarunendra Bhadauria. "Different Techniques of Steganography in Images." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem39153.

Full text
Abstract:
Abstract—Steganography is a vital technique in information security that conceals data within other non-secret data, primarily images. This paper explores four prominent image steganography techniques: Least Significant Bit (LSB), Pixel Value Differencing (PVD), Discrete Cosine Transform (DCT), and Masking &amp; Filtering. Each method is examined in terms of its operational principles, advantages, and limitations. LSB is straightforward but vulnerable, while PVD offers higher capacity and robustness. DCT enhances resistance against compression, and Masking &amp; Filtering maintains high image quality. A comparative analysis illustrates the effectiveness of these techniques regarding capacity, complexity, and robustness, providing insights for researchers and practitioners in selecting appropriate steganography methods for secure communication. Keywords: Steganography, LSB, PVD, DCT, Masking &amp; Filtering, Image Processing
APA, Harvard, Vancouver, ISO, and other styles
4

Singla, Tamanna, and Ashwani Sethi. "Steganography: A Juxtaposition between LSB DCT, DWT." International Journal of Computer Applications 126, no. 11 (2015): 6–10. http://dx.doi.org/10.5120/ijca2015906215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaur, Randeep, and Kamaljit Kaur Dhillon. "GRAYSCALE IMAGE WATERMARK DETECTION." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 100–105. http://dx.doi.org/10.24297/ijct.v3i1b.2748.

Full text
Abstract:
A Digital watermarking is a technique that provides a solution to the longstanding problems faced with copyrighting digital data. Digital watermarks are pieces of information added to digital data (audio, video, or still images) that can be detected or extracted later to make an assertion about the data. This information can be textual data about the author, its copyright, etc; or it can be an image itself. Watermarking Based on DCT Coefficient Modulation technique embeds the watermark in the DCT domain to increase the robustness of the watermarking scheme.DCT based watermarking is an example of frequency domain watermarking. The objective of this research work is to implement DCT based watermarking technique on gray scale image. The study focuses on evaluating the robustness of watermarked image after having three different attacks on watermarked image and extraction of watermark from that particular image. To compare the DCT based watermarking with LSB based watermarking and to validate the proposed work &amp; the comparative results of watermarking using DCT and LSB are also presented. This paper recommends DCT based technique for achieving robustness in digital image watermarking.
APA, Harvard, Vancouver, ISO, and other styles
6

., Priya Porwal. "DIGITAL VIDEO WATERMARKING USING MODIFIED LSB AND DCT TECHNIQUE." International Journal of Research in Engineering and Technology 03, no. 04 (2014): 630–34. http://dx.doi.org/10.15623/ijret.2014.0304112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kukuh Yulion Setia Prakoso, Yulison Herry Chrisnanto, and Fatan Kasyidi. "STEGANOGRAFI METODE INVERTED LSB MENGGUNAKAN POLA ADAPTIF DAN DCT." Jurnal Informatika dan Rekayasa Elektronik 7, no. 2 (2024): 218–30. https://doi.org/10.36595/jire.v7i2.1222.

Full text
Abstract:
Keamanan informasi merupakan aspek krusial dalam perlindungan data dari ancaman yang berpotensi merusak, mencakup penggunaan teknik steganografi untuk menyembunyikan pesan rahasia dalam media seperti gambar. Penelitian terdahulu memfokuskan pada metode Inverted LSB dengan pola adaptif, yang telah terbukti meningkatkan imperceptibility dibandingkan metode konvensional. Evaluasi menggunakan nilai MSE, PSNR dan SSIM menunjukkan kualitas gambar yang relatif tinggi, meskipun terdapat penurunan seiring dengan peningkatan panjang pesan yang disisipkan. Hasil pengujian untuk pesan berisi 1000 karakter menghasilkan nilai MSE berkisar 0.001465 hingga 0.045898, untuk nilai PSNR berkisar 61.512825 hingga 76.472891 dan untuk nilai SSIM berkisar 0.998904 hingga 0.999989, sedangkan untuk pesan 5000 karakter, nilai MSE berkisar 0.040802 hingga 0.138763, untuk nilai PSNR berkisar 56.708053 hingga 62.023989 dan untuk nilai SSIM berkisar 0.998151 hingga 0.999535. Berdasarkan hasil pengujian dan membandingkannya dengan penelitian sebelumnya, pada penelitian ini didapatkan hasil yang lebih baik dalam mempertahankan kualitas gambar seiring meningkatnya panjang pesan, yaitu untuk pesan berisi 1000 karakter menghasilkan nilai MSE berkisar 0.026306 hingga 0.039501, untuk nilai PSNR berkisar 56.1355 hingga 63.1976 dan untuk nilai SSIM berkisar 0.99743 hingga 0.99839, sedangkan untuk pesan 5000 karakter, nilai MSE berkisar 0.026307 hingga 0.039506, untuk nilai PSNR berkisar 56.1333 hingga 63.1973 dan untuk nilai SSIM berkisar 0.99596 hingga 0.99783.
APA, Harvard, Vancouver, ISO, and other styles
8

S. N., Prajwalasimha, Chethan Suputhra .S, and Mohan C. S. "Performance analysis of DCT and successive division based digital image watermarking scheme." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 2 (2019): 750. http://dx.doi.org/10.11591/ijeecs.v15.i2.pp750-757.

Full text
Abstract:
In this article, a combined Discrete Cosine Transformation (DCT) and Successive Division based image watermarking scheme is proposed. In many spatial domain approaches, the watermark information is embedded into Least Significant Bits (LSBs) of host image. These LSBs are more vulnerable to noise and other unwanted information contents in the channel, in few cases these are subjected for modifications also. Many frequency domain approaches withstands LSB interference problem but utilizes more execution time. The proposed technique is a frequency domain approach which can withstand LSB attack and utilizes very less execution time than other existing approaches. Performance analysis is done based on robustness, imperceptibility, data embedding capacity and time of execution. The experimental results are better compared to other existing techniques.
APA, Harvard, Vancouver, ISO, and other styles
9

Osama, F. AbdelWahab, I. Hussein Aziza, F. A. Hamed Hesham, M. Kelash Hamdy, A.M. Khalaf Ashraf, and M. Ali Hanafy. "Hiding data in images using steganography techniques with compression algorithms." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1168–75. https://doi.org/10.12928/TELKOMNIKA.v17i3.12230.

Full text
Abstract:
Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information&#39;s existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.
APA, Harvard, Vancouver, ISO, and other styles
10

Alobaidi, Taif, and Wasfy Mikhael. "An Adaptive Steganography Insertion Technique Based on Cosine Transform." Iraqi Journal for Electrical and Electronic Engineering 20, no. 2 (2024): 45–58. http://dx.doi.org/10.37917/ijeee.20.2.4.

Full text
Abstract:
In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB) Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase, and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR) than commonly employed truncation and energy based methods.
APA, Harvard, Vancouver, ISO, and other styles
11

Jókay, Matúš, and Tomáš Moravćík. "Image-based jpeg steganography." Tatra Mountains Mathematical Publications 45, no. 1 (2010): 65–74. http://dx.doi.org/10.2478/v10127-010-0006-9.

Full text
Abstract:
ABSTRACT This paper deals with the steganographic algorithm LSB (modification of the Least Significant Bits) in JPEG images. The focus is on minimizing of the number of modified DCT coefficients using (2k − 1, 2k − k − 1) Hamming codes. Experimental part of the paper examines the dependencies between the coding, efficiency and saturation.
APA, Harvard, Vancouver, ISO, and other styles
12

Mohammed Hassan Abd and Osamah Waleed Allawi. "Secured Mechanism Towards Integrity of Digital Images Using DWT, DCT, LSB and Watermarking Integrations." Ibn AL-Haitham Journal For Pure and Applied Sciences 36, no. 2 (2023): 454–68. http://dx.doi.org/10.30526/36.2.3088.

Full text
Abstract:
"Watermarking" is one method in which digital information is buried in a carrier signal; the hidden information should be related to the carrier signal. There are many different types of digital watermarking, including traditional watermarking that uses visible media (such as snaps, images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital watermark must be able to withstand changes that can be made to the carrier signal in order to protect copyright information in media files. The goal of digital watermarking is to ensure the integrity of data, whereas steganography focuses on making information undetectable to humans. Watermarking doesn't alter the original digital image, unlike public-key encryption, but rather creates a new one with embedded secured aspects for integrity. There are no residual effects of encryption on decrypted documents. This work focuses on strong digital image watermarking algorithms for copyright protection purposes. Watermarks of various sorts and uses were discussed, as well as a review of current watermarking techniques and assaults. The project shows how to watermark an image in the frequency domain using DCT and DWT, as well as in the spatial domain using the LSB approach. When it comes to noise and compression, frequency-domain approaches are far more resilient than LSB. All of these scenarios necessitate the use of the original picture to remove the watermark. Out of the three, the DWT approach has provided the best results. We can improve the resilience of our watermark while having little to no extra influence on image quality by embedding watermarks in these places.
APA, Harvard, Vancouver, ISO, and other styles
13

Purba, Ronsen, Arwin Halim, Apin Ridwan, and Rudy Rudy. "Fragile Image Watermarking Berbasis DCT dengan Operator Evolusi Hybrid of Particle Swarm Optimization." Jurnal SIFO Mikroskil 15, no. 1 (2014): 11–20. http://dx.doi.org/10.55601/jsm.v15i1.145.

Full text
Abstract:
Fragile image watermarking berbasis discrete cosine transform (DCT) merupakan sebuah teknik watermarking dimana gambar sampul ditransformasi ke domain frekuensi. Lalu gambar tanda tangan disisipkan dengan mensubstitusi least significant bit (LSB) pada koefisien domain frekuensi. Namun, hasil ekstraksi gambar tanda tangan akan sangat berbeda karena terjadi penyimpangan dalam menerjemahkan bilangan riil ke bilangan bulat dengan hasil yang diperoleh dari proses inverse DCT (IDCT) yang mengakibatkan kehilangan gambar tanda tangan yang telah disisipkan ke dalam gambar. Untuk mengatasi masalah tersebut, diterapkan hybrid of particle swarm optimization (HPSO) dengan penambahan cauchy mutation dan roulette wheel selection. Pendekatan ini melakukan evaluasi fitness untuk setiap partikel hingga diperoleh satu set solusi terbaik yang menjadi aturan konversi bilangan riil ke bilangan bulat. Hasil pengujian yang telah dilakukan menunjukkan peningkatan yang signifikan dalam meningkatkan akurasi dan kualitas gambar yang lebih baik dibandingkan pembulatan sederhana.
APA, Harvard, Vancouver, ISO, and other styles
14

Amit, Kumar, and Niwaria Kamal. "DWT and LSB based Audio Steganography- A Review." International Journal of Engineering and Management Research 8, no. 1 (2018): 82–84. https://doi.org/10.5281/zenodo.3362756.

Full text
Abstract:
Steganography may be a technique for hiding data in a host signal. The host signal may be a still image, speech or video and therefore the message signal that&#39;s hidden within the host signal can be a text, image or an audio signal. For data hiding in acoustic, discrete cosine transform (DCT) and discrete wavelet transform (DWT) both are used. Perfect audio Steganography technique aim at embedding data in an imperceptible, robust and secure way and so extracting it by authorized people. Hence, up to this point the main challenge in digital audio steganography is to get robust high capacity steganography systems. Leaning towards designing a system that ensures high capacity or robustness and security of embedded data has LED to great diversity within the existing steganography techniques. In this paper, we tend to present a existing position of art literature in digital audio steganography technique. In this paper a completely unique methodology for digital audio steganography someplace encrypted concealed data is embedded by adaptively modifying wavelet packet coefficients of host audio signal. Steganography is an information hiding technique where secret message is embedded into unsuspecting cover signal. Measuring of fine steganography algorithmic rule includes security, capacity, robustness and imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
15

Gulášová, Michala, and Matúš Jókay. "Steganalysis of Stegostorage Library." Tatra Mountains Mathematical Publications 67, no. 1 (2016): 99–116. http://dx.doi.org/10.1515/tmmp-2016-0034.

Full text
Abstract:
Abstract The main goal of this research is the detection of the secret messages hidden in JPEG files, which were embedded by StegoStorage library. This tool allows the user to embed any type of information into a folder of images. Sequential, pseudo-random or Hamming code-based embedding into the least significant bit (LSB) of DCT coefficients is possible. It is possible to choose what fraction of capacity of the cover files are filled. The aim of this contribution is to test the statistical LSB embedding model (modified weighted-stego analysis) for all modes of embedding which StegoStorage library offers, and for all cover files’ capacities, respectively. Another goal is to implement a more appropriate type of steganalytic attack for Hamming codes and test it. For this purpose, the RS (Regular/Singular) steganalysis was selected. The detectability of the LSB embedding model of sequential embedding is possible if the cover files are filled to at least one percent of capacity. In the case of pseudo-random embedding, the secret message can be detected if the cover files are filled to at least 10% of their capacity. Hamming codes were undetectable using this type of an attack. In the case of attack by RS steganalysis, another situation arose. When sequential or pseudo-random embeddings were used, the results indicated the detectability was possible if the cover files were filled up at least 5 percent of capacity. The capacity filling of 5 percent corresponds to 2.5 percent of DCT coefficient changes from the original media in the case of sequential embedding. This value, 2.5%, is the threshold for the utilization of Hamming codes, too. Therefore, Hamming codes (7, 4), (15, 11) and (32, 26) indicated the detectability, because they exceeded that limit.
APA, Harvard, Vancouver, ISO, and other styles
16

Deng, Hua, Chun Hua Zhang, Hai Zhu Yu, and Jj Fu Zhang. "Design Method of H.264/AVC Video Watermarking Based on Intra Prediction Coding." Applied Mechanics and Materials 644-650 (September 2014): 4257–60. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4257.

Full text
Abstract:
Aiming at problems meet in the copyright of H.264/AVC video, a method of digital watermarking based on intra prediction coding. The method combines wavelet transforms, chaos theory and spread spectrum modulation to preprocess grayscale image. Then according to different intra prediction mode of I-frame brightness sub block, selects different DCT coefficient, and embeds the watermark information by improved LSB algorithm. Experiments show that, this method ensures video effects without distortion, high blind detection accuracy, and little effect on code rate.
APA, Harvard, Vancouver, ISO, and other styles
17

Mr., Mandar Digambar Khatavkar, and A. S. Mali Prof. "A REVIEW OF IMAGE SECURITY WITH STEGANOGRAPHY USING DCT COEFFICIENT AND ENCRYPTION." JournalNX - A Multidisciplinary Peer Reviewed Journal 2, no. 6 (2016): 26–30. https://doi.org/10.5281/zenodo.1469535.

Full text
Abstract:
In the mid 1998s the rise of the internet &amp; multimedia techniques has prompted increasing interest in hiding data in digital media. Early research concentrated on watermarking to protect copyrighted multimedia products. In today&acirc;&euro;&trade;s growing world Image data security is the essential portion in communication and multimedia world .The least significant-bit (LSB) based technique is one of the popular for steganography. Medium integrity is an important issue in steganography, whenever one media is hidden into other the originality of cover media should not affect. Image Security with Steganography using DCT Coefficient and Encryption providing security of data &amp; helps to avoid third party access of data is the challenging world. https://journalnx.com/journal-article/20150087
APA, Harvard, Vancouver, ISO, and other styles
18

Amit, Kumar, and Niwaria Kamal. "Result Analysis of DWT and LSB based Audio Steganography." International Journal of Engineering and Management Research 8, no. 1 (2018): 79–81. https://doi.org/10.5281/zenodo.3362750.

Full text
Abstract:
Information security, Steganography is a vast field of computer science that develops numerous intelligent systems for secret communication. Image steganography is the most popular dimension due to its frequency on the internet in this field. The goal of this research work is to provide high level of security, maximum embedding capacity, efficiency and reliability for secret communication using image processing and steganographic techniques. Same work has been done before through cryptographic techniques but with time steganography emerges as a more secure and power full technique, where as cryptography lacks in many ways. Now in modern era, steganography has come up with all the deficiencies of cryptography. In this research work, preprocessing, enhancement is applied on image. After that audio file is taken as secret information and on that sound file Discrete Cosine Transform (DCT) will be applied for compressing audio message .for Enhancing the security Advance encryption standard (AES) is used for the encryption of audio file and this encryption technique is more securing then other encryption techniques. Finally using Least Significant Bit (LSB) secret msg will be embedded in that image. The purpose of this work is to provide an intelligent system for secure communication within different security agencies as well as for institutes and to reduce the statistical attacks.
APA, Harvard, Vancouver, ISO, and other styles
19

Thakre, Nitin, Sakshi Junghare, Pranali Sakhre, and Dipti Khawse. "Steganography a Technique to Hide Information within an Image." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 1 (2023): 14–19. http://dx.doi.org/10.46610/jcspic.2023.v02i01.003.

Full text
Abstract:
Steganography is the science and art of secret communication between two parties that seek to conceal the content of their messages. It is a technology that embeds information into cover photos without losing information after embedding. Steganography is the technique and method of hiding a message so that no one but the sender and receiver will suspect how the message survived. This article compares two different techniques. The first technique uses the least significant bit (LSB) without encryption or compression. Now in the second method, the encrypted message is first encrypted and then the least significant bit is used. The image is then transformed into the frequency domain using a Discrete Cosine Transform (DCT). The LSB algorithm is applied in the local domain where the image parts corresponding to the payload are embedded in the least significant parts of the overlay image and the image is embedded in the least significant parts of the overlay image to generate a steganographic image. The DCT algorithm is appliedin the frequency domain and transforms from the steganographic image domain to the spatial domain where the image title is interpolated to the least significant parts of the image. This white paper mainly provides an overview of steganography requirements benefits and related technologies. This white paper shows which steganographic methods are most effective for which requirements are met and which applications are most compatible with which steganographic methods.
APA, Harvard, Vancouver, ISO, and other styles
20

Bobade, Miss Gayatri Ganesh. "Effect of Secret Image Transformation on the Steganography Process by using LSB & DCT Techniques." International Journal for Research in Applied Science and Engineering Technology 7, no. 7 (2019): 468–74. http://dx.doi.org/10.22214/ijraset.2019.7071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Alshammari, Kaznah. "Exposing the most match parity bit approach (MMPB-A) for data concealment in digital images." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 8 (2024): 57–65. http://dx.doi.org/10.21833/ijaas.2024.08.007.

Full text
Abstract:
Steganography was originally developed to hide and transmit sensitive information. One major advancement in this field is the ability to hide data within digital images. Significant progress has been made, demonstrating effective methods for concealing data. Various techniques have been used, including statistical steganography, distortion techniques, and the Discrete Cosine Transform (DCT). However, the Least Significant Bit (LSB) method is particularly important and remains the most widely used. Researchers have developed methods based on these principles, such as pseudorandom permutation. This paper introduces the Most Match Parity Bit Approach (MMPB-A), which is based on the LSB method. MMPB-A strategically identifies the parity bits of selected pixels to embed information in cover images. It uses a six-bit encryption for each symbol, allowing ample space to hide information while preserving similarity and secrecy. Additionally, encoding hidden data indices in a three-bit code enhances data concealment and ensures greater confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
22

Radhe, Shyam Panda, Gupta Deepika, Jaiswal Madhuri, Kasar Vaishnavi, and A. L. Prasanna. "Image steganography approach using spatial and transform domain technique." i-manager's Journal on Computer Science 10, no. 1 (2022): 21. http://dx.doi.org/10.26634/jcom.10.1.18504.

Full text
Abstract:
Cryptography is often used to keep information confidential by making it illegible. However, incomprehensible information may raise suspicions of the adversary and may lead him to sabotage this style of communication. Therefore, steganography has a place in the arena of information security. Steganography refers to the technique of hiding information in digital media to hide the existence of information. Data caching is the art of hiding data for colorful purposes similar as; to maintain private data, secure non-public data and so on. Securely exchange the data over the internet network is veritably important issue. So, to transfer the data securely to the destination, there are numerous approaches like cryptography and steganography. In this design we propose a LSB &amp; DCT grounded steganographic system for hiding the data by applying Least Significant Bit (LSB) algorithm for bedding the data into the images which is enforced through the HTML, CSS, JavaScript.
APA, Harvard, Vancouver, ISO, and other styles
23

Chaitanya, Gogineni Krishna, Sasidhar Reddy Gaddam, Khadri Syed Faizz Ahmad, Balaji Vicharapu, Uppuluri Lakshmi Soundharya, and Uppuluri Naga Lakshmi Madhuri. "A Multimodal Approach to Digital Security: Combining Steganography, ‎Watermarking, and Image Enhancement." International Journal of Basic and Applied Sciences 14, no. 2 (2025): 611–19. https://doi.org/10.14419/3r5r6r74.

Full text
Abstract:
This study addresses the limitations of traditional Least ‎Significant Bit (LSB) techniques in digital forensics by ‎proposing an intelligent watermarking framework enhanced ‎with Contrast-Limited Adaptive Histogram Equalization ‎‎(CLAHE) and Spread Spectrum Watermarking. We propose a ‎robust hybrid approach combining Discrete Cosine Transform ‎‎(DCT)-based frequency domain watermarking with spread ‎spectrum techniques to improve imperceptibility, security, and ‎resilience against unauthorized tampering. The proposed ‎model embeds robust watermarks with minimal impact on ‎perceptual image quality, validated through quantitative ‎metrics such as Mean Squared Error (MSE) and perceptual ‎analysis. Comparative experiments demonstrate superior ‎performance over conventional LSB methods, particularly in ‎resisting compression and noise-based attacks. Additionally, ‎we integrate cryptographic hashing (SHA-256) for ‎authentication, ensuring tamper-proof verification. The results ‎highlight the framework’s efficacy in digital forensics, ‎copyright protection, and secure multimedia communication. ‎Future work explores adaptive watermarking with machine ‎learning and blockchain integration for enhanced traceability‎.
APA, Harvard, Vancouver, ISO, and other styles
24

Fadhil Mohammed, Amal, Hayder A. Nahi, Akmam Majed Mosa, and Inas Kadhim. "Secure E-healthcare System Based on Biometric Approach." Data & Metadata 2 (July 8, 2023): 56. http://dx.doi.org/10.56294/dm202356.

Full text
Abstract:
A secure E-health care system is satisfying by maintaining data authenticity and privacy. Authentic users only access and edit medical records, any alteration in the medical records may result in a misdiagnosis and, as a result, harm the patient's life. Biometric method and watermarking modes are utilized to satisfy goal, such as Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). In this work focused on a biometric watermarking system where the iris code of the sender programmed as a sender authentication key. The confidentiality of the patient information is safeguarded via encrypting it with an XOR algorithm and embedding the key in the DCT image. The algorithm has demonstrated which is suggested system has met earlier constraints. We used samples of original watermarked images with PSNR value, embedding time and extraction time, the lowest embedding time was 0.0709 and the PSNR value was 49.2369.
APA, Harvard, Vancouver, ISO, and other styles
25

Waqas, Ghulam Jilani, Ishtiaq Ahmad, Muhammad Kashif Samee, Muhammad Nasir Khan, and Ali Raza. "A hybrid OFDM–CDMA-based robust image watermarking technique." International Journal of Wavelets, Multiresolution and Information Processing 18, no. 06 (2020): 2050043. http://dx.doi.org/10.1142/s0219691320500435.

Full text
Abstract:
Digital watermarking is a process of embedding hidden information called watermark into different kinds of media objects. It uses basic modulation, multiplexing and transform techniques of communication for hiding information. Traditional techniques used are least significant bit (LSB) modification, discrete cosine transform (DCT), discrete wavelet transform (DWT), discrete Fourier transform (DFT), code division multiple access (CDMA) or a combination of these. Among these, CDMA is the most robust against different attacks except geometric attacks. This paper proposes a blind and highly robust watermarking technique by utilizing the basis of orthogonal frequency division multiplexing (OFDM) and CDMA communication system. In this scheme, the insertion process starts by taking DFT of host images, permuting the watermark bits in randomized manner and recording them in a seed as a key. Then PSK modulation follows inverse DFT (IDFT) that gives watermark information as OFDM symbols. These symbols are spread using spreading codes and then arithmetically added to the host image. Finally, scheme applies inverse DCT (IDCT) to get watermarked host images. The simulation results of the proposed scheme are compared with CDMA-based scheme in DCT domain. The results show that the robustness of the proposed scheme is higher than the existing scheme for non-geometric attacks.
APA, Harvard, Vancouver, ISO, and other styles
26

V., Ashok Kumar, Dharmaraj C., and Srinivasa Rao Ch. "A Hybrid Digital Watermarking Approach Using Wavelets and LSB." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 5 (2017): 2483–95. https://doi.org/10.11591/ijece.v7i5.pp2483-2495.

Full text
Abstract:
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell&rsquo;s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5&times;5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LH Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient. The robustness of the proposed scheme is evaluated against various image-processing attacks.
APA, Harvard, Vancouver, ISO, and other styles
27

Ratnasari, Anita Putri, and Felix Andika Dwiyanto. "Metode Steganografi Citra Digital." Sains, Aplikasi, Komputasi dan Teknologi Informasi 2, no. 2 (2020): 52. http://dx.doi.org/10.30872/jsakti.v2i2.3300.

Full text
Abstract:
Steganografi merupakan teknik penyembunyian data dalam media. Dalam penyembunyiannya, pesan rahasia disisipkan pada media pembawa(carrier file) antara lain, teks, gambar, audio dan video. Salah satu carrier file dalam steganografi adalah gambar/citra digital, yang merupakan media yang paling sering digunakan dalam pertukaran data melalui internet. Dalam review literatur ini, akan dijelaskan tentang metode steganografi pada citra digital, seperti LSB, MSB, DCT, DWT, Spread Spectrum dan BPCS. Termasuk penjelasan tentang perbandingan berupa kelebihan dan kelemahan dari masing-masing metode. Dengan melihat dan mempelajari beberapa metode tersebut diharapkan pengembangan yang dilakukan akan lebih baik dan dapat menutupi kekurangan sebelumnya.
APA, Harvard, Vancouver, ISO, and other styles
28

Khalifa, Farhad M., and Mohammed G. Saeed. "Image Watermarking Using All Phase Discrete Cosine Biorthogonal Transform in Selected Pixel Blocks." Polytechnic Journal 10, no. 1 (2020): 68–73. http://dx.doi.org/10.25156/ptj.v10n1y2020.pp68-73.

Full text
Abstract:
In the past decade, a transform called all phase discrete cosine biorthogonal transform (APDCBT) appeared in the field of digital image processing. It is mainly used to solve the negativity found in discrete cosine transform (DCT), especially in a low bit rate. In this paper, the APDCBT is employed for watermark insertion based on selected regions of an image. The insertion is depending on the homogeneity of each part of the image. To determine the extent of homogeneity, there are two criteria: Mean and standard deviation are applied for the intensity of the image. Medium frequency bands of APDCBT in image pixel blocks are used to hold the embedded watermark. Then, the transform is inversed to obtain the resultant watermarked image. The robustness of APDCBT against watermark removal attacks is tested and the experimental results showed the superiority of the APDCBT over traditional DCT in the watermark embedding system. More specifically, when the LSB reset attack applied. For instance, when the contrast adjustment attack applied, the average of normalized cross-correlation (NCC) values of extracted watermark images with the original watermark, it was 0.992 for the proposed method. This is a promised result, if it is compared with the NCC of the DCT method, which was 0.423. The proposed method can be used for copyright protection purpose.
APA, Harvard, Vancouver, ISO, and other styles
29

Ouyang, Chun-Juan, Chang-Xin Liu, Ming Leng, and Huan Liu. "An OMP Steganographic Algorithm Optimized by SFLA." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 01 (2017): 1754001. http://dx.doi.org/10.1142/s0218001417540015.

Full text
Abstract:
In this paper, we propose a novel steganographic method, which utilizes the sparsity and integrity of the image compressed sensing to reduce the risk of being detected by steganalysis. In the proposed algorithm, the message hiding process is integrated into the image sparse decomposition process without affecting the image perceptibility. First, the cover image is decomposed by the orthogonal matching pursuit algorithm of image sparse decomposition, and the shuffled frog leaping algorithm (SFLA) is used to select the optimal atom in each decomposition iteration. Then, different quantization bits are adopted to quantify the sparse decomposition coefficients. Finally, via LSB[Formula: see text] steganographic strategy, the secret message is embedded in the least significant bits of the quantized coefficients. Experimental results show that the embedded data are invisible perceptually. Simultaneously, experiments show that the new steganography has good expandability in embedding capacity, owing to less sensitivity to the embedding bits. The security of the proposed method is also evaluated comparatively, by using four steganalyzers with rich feature, which indicates superior performance of the proposed method comparing with other steganographies conducted in sparse decomposition domain and the LSB[Formula: see text] methods used in spatial domain and DCT domain.
APA, Harvard, Vancouver, ISO, and other styles
30

Ameen, Siddeeq Y., and Muthana R. Al-Badrany. "Optimal Image Steganography Content Destruction Techniques." International Journal of Computers and Communications 15 (November 25, 2021): 84–88. http://dx.doi.org/10.46300/91013.2021.15.14.

Full text
Abstract:
The paper presents two approaches for destroying steganogrphy content in an image. The first is the overwriting approach where a random data can be written again over steganographic images whereas the second approach is the denoising approach. With the second approach two kinds of destruction techniques have been adopted these are filtering and discrete wavelet techniques. These two approaches have been simulated and evaluated over two types of hiding techniques, Least Significant Bit LSB technique and Discrete Cosine Transform DCT technique. The results of the simulation show the capability of both approaches to destroy the hidden information without any alteration to the cover image except the denoising approach enhance the PSNR in any received image even without hidden information by an average of 4dB.
APA, Harvard, Vancouver, ISO, and other styles
31

Umanskiy, O. G. "Review of Steganographic Methods and their Application in Securing Banking Information Systems." Èlektronnoe modelirovanie 46, no. 4 (2024): 87–111. http://dx.doi.org/10.15407/emodel.46.04.087.

Full text
Abstract:
The article provides a detailed analysis of modern steganographic methods and their practical applications across various fields, with a focus on the prospects for integration into banking systems. It examines key steganographic methods, including Least Significant Bit (LSB) sub-stitution, Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), as well as hybrid approaches combining steganography with cryptography. The impact of stega-nographic methods on enhancing the security of internal communications, protecting client da-ta, and ensuring the continuity of business processes in the banking sector is analyzed. The ar-ticle presents real-world examples of implementing steganography to protect online tran¬sac-tions and mobile banking, and discusses the main stages of integrating these methods into banking systems, including security requirement analysis, testing, and staff training.
APA, Harvard, Vancouver, ISO, and other styles
32

Lei, Yue Rong, Xu Zhan, Ling Yan Du, Hui Ming Zeng, and Jian Ling Chen. "A Color Image Authentication System." Applied Mechanics and Materials 380-384 (August 2013): 2925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2925.

Full text
Abstract:
Image authentication has achieved a sharp attention now a day due to broad availability of internet services. Maldistribution and illegal copying of image volatiles the authenticity of image-ownership. In this regard the digital watermarking-based image authentication system is studied. A color image authentication system is proposed. This system converts a color image into a grayscale image, and divides the grayscale image into 8*8 small pieces. Each small piece is made into DCT transform and extracted low frequencies to form the watermark. Then, the original image uses LSB algorithm and hash algorithm in watermark image to form authentication code. The system makes the authentication code as watermark information to embed watermark. The system is made in experiment. The result shows the system has good imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
33

Vibha, Gupta* Ekta Dixit. "A REVIEW ON VARIOUS TECHNIQUES FOR DIGITAL IMAGE WATERMARKING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 476–80. https://doi.org/10.5281/zenodo.573516.

Full text
Abstract:
In today’s Era, message transmissions over the internet have protection problems of the digital data. Hence, protection of secret messages during transmission becomes a difficult subject. Digital watermarking is provide protection of digital information or identifying information against illegitimate exploitations and allocations. Watermarking is a technology to guarantee and make possible data certification, security and copyright defense of the information. The intend of watermarking is to consist of hidden data in multimedia information to ensure security examination. It would be then probable to progress the surrounded message, even if the information was distorted by one or more non-dangerous attacks. In this paper, we present the various types of watermarking techniques and application region where water making technique required. Also a survey on the some new work is done in image watermarking field.
APA, Harvard, Vancouver, ISO, and other styles
34

Nie, Soo Ann, Ghazali Sulong, Rozniza Ali, and Andrew Abel. "The use of Least Significant Bit (LSB) and Knight Tour Algorithm for image steganography of cover image." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5218. http://dx.doi.org/10.11591/ijece.v9i6.pp5218-5226.

Full text
Abstract:
&lt;span lang="EN-US"&gt;Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). However, different approaches still have its own weaknesses. Therefore image stenography using Knight Tour Algorithm with Least Significant Bit (LSB) technique is presented. The main objective is to improve the security factor in the stego image. Basically, the proposed technique is divided into two parts which are the sender and receiver side. Then, steganalysis which is a type of attack on stenography algorithm is used to detect the secret message in the cover image by the statistical analysis of pixel values. Chi Square Statistical Attach which is one of the type of steganalysis is used to detect these near-equal Po Vs in images and bases the probability of embedding on how close to equal the even pixel values and their corresponding odd pixel values are in the test image. The Knight Tour Algorithm is applied due to the common Least Significant Bit technique that is weak in security and easily decoded by outsider.&lt;/span&gt;
APA, Harvard, Vancouver, ISO, and other styles
35

Mejia Cabrera, Ivan, and Fernando Sialer Ayala. "COMPARACIÓN DE TÉCNICAS ESTEGANOGRÁFICAS DE DOMINIO ESPACIAL Y DOMINIO FRECUENCIAL EN IMÁGENES DIGITALES." INGENIERÍA: Ciencia, Tecnología e Innovación 2, no. 2 (2015): 41. http://dx.doi.org/10.26495/icti.v2i2.257.

Full text
Abstract:
La esteganografía estudia diferentes técnicas para la ocultación de datos en otros objetos, conocidos como objetos portadores. Actualmente, estos objetos portadores suelen ser medios digitales, como por ejemplo imágenes, vıdeos o archivos de sonido. No obstante, sin lugar a dudas, el medio más utilizado en la actualidad son las imágenes, por su amplia difusión en Internet [1]. Las imágenes digitales sufren ciertos cambios en su matriz que la compone, haciendo que la imagen digital se distorsione o presente cambio alguno [2]. En este trabajo se evaluó las técnicas esteganográficas de Dominio Espacial (DE) y Dominio Frecuencial (DF), para el ocultamiento de información aplicando en los espacios de color RGB, escala de grises, YCbCr e YUV, basándose en la imperceptibilidad de la información en Imágenes Digital. La primera técnica permite ocultar información en los pixeles de la imagen basándose en el método Least Significant Bit (LSB) alterando el último bit del pixel binarizado. La segunda técnica permite ocultar información en las bajas frecuencias de la imagen basándose en la Transformada Discreta de Coseno (DCT) alterando los coeficientes AC binarizados mediante el método Least Significant Bit (LSB). Ambas técnicas procesan la Imagen Digital y muestran como resultado una nueva Imagen Digital con la información oculta.
APA, Harvard, Vancouver, ISO, and other styles
36

Soo, Ann Nie, Sulong Ghazali, Ali Rozniza, and Abel Andrew. "The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5218–26. https://doi.org/10.11591/ijece.v9i6.pp5218-5226.

Full text
Abstract:
Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). However, different approaches still have its own weaknesses. Therefore image stenography using Knight Tour Algorithm with Least Significant Bit (LSB) technique is presented. The main objective is to improve the security factor in the stego image. Basically, the proposed technique is divided into two parts which are the sender and receiver side. Then, steganalysis which is a type of attack on stenography algorithm is used to detect the secret message in the cover image by the statistical analysis of pixel values. Chi Square Statistical Attach which is one of the type of steganalysis is used to detect these near-equal Po Vs in images and bases the probability of embedding on how close to equal the even pixel values and their corresponding odd pixel values are in the test image. The Knight Tour Algorithm is applied due to the common Least Significant Bit technique that is weak in security and easily decoded by outsider.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Yu Jie, and Yuan Yuan Zhang. "Design and Implementation of Video Copyright Protection System Based on LabVIEW and Water Transfer Printing Materials." Advanced Materials Research 460 (February 2012): 206–9. http://dx.doi.org/10.4028/www.scientific.net/amr.460.206.

Full text
Abstract:
In view of the problems of the traditional digital copyright protection system which can’t fully protect the digital content and was vulnerable to be cracked, a video copyright protection system based on LabVIEW was proposed. The system used the basic theory of LSB algorithm, and embedded the watermark information into lowest position of DC about the DCT coefficients of the I-frame of video. The system can’t only have the good robustness under the premise of the invisibility of watermark but also realize the watermark blind extracted, achieving the requirement of the watermark embedded and extracted real-timely. The experimental results show that the algorithm has good robustness. The system has the advantages of operating easily, easy to be upgraded, low cost and has good prospect for application.
APA, Harvard, Vancouver, ISO, and other styles
38

Cruz, Clara, Rogelio Reyes, Mariko Nakano, and Héctor Pérez. "Semi-fragile watermarking based content image authentication scheme." Revista Facultad de Ingeniería Universidad de Antioquia, no. 56 (February 28, 2013): 160–69. http://dx.doi.org/10.17533/udea.redin.14664.

Full text
Abstract:
This paper presents a block-wise semi-fragile watermarking scheme for image content authentication, with tamper area localization and recovery capability. Before the watermark sequence is generated, the original image is divided into two regions: The Region of Interest (ROI) and the Region of Embedding (ROE), where the ROI is selected manually by the owner of the image and the ROE is rest of the whole image after subtracting region belonging to the ROI. The binary watermark of each ROI block is generated by the DC and the 6 lowest AC components in the zig-zag order of the DCT coefficients of these blocks. These extracted bit sequence are embedded into the LSB of the DCT coefficients of the corresponding ROE blocks which are indicated by a mapping list previously generated using a secret key. In the authentication process, the watermark sequence is extracted from the ROI blocks. Then it is compared with the sequence extracted from the corresponding ROE blocksto determine if the ROI block has been altered; in this case the tampered ROI blocks are recovered replacing them by the extracted watermark sequence from ROE. Simulation results show that the reconstructed image quality and the watermark robustness to JPEG compression are better than the previously reported methods by other authors under the same conditions.
APA, Harvard, Vancouver, ISO, and other styles
39

Singh, Ranjeet Kumar, and Dilip Kumar Shaw. "A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security." International Journal of Information Security and Privacy 12, no. 1 (2018): 1–12. http://dx.doi.org/10.4018/ijisp.2018010101.

Full text
Abstract:
Now a days, in communication technology safety of digital data in the form of text, image, and video, audio is a biggest problem. With the rapid development of the network multimedia systems, security is the biggest issue. Digital watermarking is one of the solutions to these problems. It hides some secret data into the original image and this information is use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique and dual watermarking for the purpose of Providing highly security and authentication of digital data. This paper use cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are given in the form of table and graph. This algorithm provides more security and data authentication compare to other image data security approach.
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Wei, Caijun Zhang, Jinqiu Zhang, Kaiqiang Xian, Qianjun Wu, and Xiaolong Wang. "A Two-domain Data Hiding Scheme for Data Signature in Integrated Online Services Applications." Journal of Physics: Conference Series 2137, no. 1 (2021): 012055. http://dx.doi.org/10.1088/1742-6596/2137/1/012055.

Full text
Abstract:
Abstract There is confidential data in integrated online services applications. The data needs to be hidden before transmission on the Internet, and the data authenticity should be assured. Information hiding technology is an effective way of protecting the confidential data and may be used for assuring data authenticity. A Two-domain data hiding scheme (TDHS) is introduced in the paper to protect contract document authenticity in grid system. TDHS aims to embed confidential data into signature image in both spatial and frequency domain. LSB-like algorithm is used to generate a signature image Hs by embedding feature data of contract document into the original signature image H in the spatial domain. Then DCT algorithm is adopted to embed the watermark in signature image Hs in the frequency domain, and generate signature image Hs ready . The signature image Hs ready is inserted into the contract document. When received the document with signature, the recipient can verify its authenticity. The feasibility of TDHS is verified through experiments.
APA, Harvard, Vancouver, ISO, and other styles
41

Jasim Halboos, Estabraq Hussein, and Abbas M. Albakry. "Improve steganography system using agents software based on statistical and classification technique." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1595–606. http://dx.doi.org/10.11591/eei.v12i3.4540.

Full text
Abstract:
In digital communications, information security is a paramount necessity. In the hiding algorithm, there are three basic parameters: security, capacity, and imperceptibility. Therefore, there are many ways to design the steganography algorithm, such as least significant bit (LSB), discrete wave transformation (DWT), and discrete cosine transform (DCT). The aim of this paper is to improve agent software design based on a steganography system. It proposed an agent system based on a support vector machine (SVM) classifier to hide a secret message in a certain cover image. The common dataset for steganography uses 80% training and 20% testing to get accurate results. Developing an agent system depends on six statistical parameters such as energy, standard deviation, histogram, variance, mean, and entropy. This resulted in features classified by the SVM classifier to predict the best cover image to be nominated for embedding. Worthy results were obtained in terms of imperceptibility, attack, and cover image prediction by statistical issues.
APA, Harvard, Vancouver, ISO, and other styles
42

Asoke Nath, Sankar Das, Rahul Sharma, Subhajit Mandal, and Hardick Sadhu. "Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover file." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 291–300. http://dx.doi.org/10.32628/cseit24103107.

Full text
Abstract:
This research paper offers an in-depth examination of digital steganography, with a focus on the diverse methodologies utilized for embedding secret data within cover files. Steganography, the practice of concealing information within other non-secret data, ensures the hidden message remains undetectable to unauthorized observers. This study systematically reviews both traditional and modern steganographic techniques, dissecting their fundamental mechanisms, advantages, and weaknesses. Techniques explored include Least Significant Bit (LSB) insertion, discrete cosine transform (DCT), discrete wavelet transform (DWT), and innovative methods leveraging deep learning and adaptive algorithms. Each method is assessed for its imperceptibility, robustness, and data capacity, offering a comparative analysis to underscore their respective practical applications and limitations. Additionally, the paper delves into steganalysis—methods for detecting hidden information—to provide a comprehensive perspective on the field. Through experimental evaluation and theoretical analysis, this study seeks to enhance the understanding of digital steganography, presenting insights that could inform future research and the development of more secure data hiding techniques.
APA, Harvard, Vancouver, ISO, and other styles
43

Estabraq, Hussein Jasim Halboos, and M. Albakry Abbas. "Improve steganography system using agents software based on statistical and classification technique." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1595–606. https://doi.org/10.11591/eei.v12i3.4540.

Full text
Abstract:
In digital communications, information security is a paramount necessity. In the hiding algorithm, there are three basic parameters: security, capacity, and imperceptibility. Therefore, there are many ways to design the steganography algorithm, such as least significant bit (LSB), discrete wave transformation (DWT), and discrete cosine transform (DCT). The aim of this paper is to improve agent software design based on a steganography system. It proposed an agent system based on a support vector machine (SVM) classifier to hide a secret message in a certain cover image. The common dataset for steganography uses 80% training and 20% testing to get accurate results. Developing an agent system depends on six statistical parameters such as energy, standard deviation, histogram, variance, mean, and entropy. This resulted in features classified by the SVM classifier to predict the best cover image to be nominated for embedding. Worthy results were obtained in terms of imperceptibility, attack, and cover image prediction by statistical issues.
APA, Harvard, Vancouver, ISO, and other styles
44

Barhate, B. H., and R. J. Ramteke. "Comparative Analysis and Measuring Qualitative Factors using Colour and Gray Scale Images for LSB and DCT- Mid Band Coefficient Digital Watermarking." International Journal of Computer Applications 128, no. 12 (2015): 34–38. http://dx.doi.org/10.5120/ijca2015906684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hammad, Omar Mejbel, Ikram Smaoui, Ahmed Fakhfakh, and Mohammed Mahdi Hashim. "An Overview of Image Steganography Techniques: Historical Development, Methodologies, and Evaluation Criteria." SHIFRA 2024 (June 3, 2024): 74–87. http://dx.doi.org/10.70470/shifra/2024/009.

Full text
Abstract:
This paper provides a detailed overview of image steganography, tracing its historical roots and examining the development of modern techniques. Steganography, derived from the Greek words "stegos" (cover) and "graphia" (writing), refers to the practice of concealing information within a host medium. Historically, steganographic techniques included tattooing hidden messages and using invisible ink, but the digital age has introduced new possibilities for secure data embedding, particularly within images. With the advent of the internet, the need for robust steganographic techniques has increased, leading to advancements in both spatial and frequency domain methods, including Least Significant Bit (LSB) replacement, Discrete Cosine Transform (DCT), and wavelet-based techniques. This paper also reviews evaluation criteria such as Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), and Structural Similarity Index Measure (SSIM) to assess the effectiveness of various steganographic methods in achieving high security, capacity, and imperceptibility. Challenges such as balancing these criteria, developing multi-criteria evaluation tools, and optimizing embedding processes are highlighted. This review aims to provide insights into current advancements, limitations, and future directions for research in image steganography.
APA, Harvard, Vancouver, ISO, and other styles
46

Gwala, Dharmendra, and Vivek Shrivastava. "Secure Images for Copyright by Watermarking in Transform sphere using bidirectional Neural Network." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 04 (2013): 97–102. https://doi.org/10.5281/zenodo.14594677.

Full text
Abstract:
Person beings knowledge a non preventable circumstances of distribution and redistribution their pictures, documents, videos etc on the internet about every week. Intruders are frequently the ones who do not desire to work hard and they maintain on somebody&rsquo;s original work. watermarking is the process of embedding data called a watermark into a multimedia object such that watermark can be detected or extracted later to make an declaration about the object. Watermarking is adding&ldquo;ownership&rdquo; information in multimedia inside to show the dependability. There are generally two most popular ways of embedding the watermark in the digital content i.e. spatial sphere and transform sphere. In spatial sphere, Least-Significant Bit (LSB), SSM Modulation-Based Technique has been developed. For DCT sphere, block based approach and for wavelet sphere, multi-level wavelet transformation technique and CDMA based approaches has been developed. Presented techniques based on spatial and occurrence domain suffer from the problems of low Peak Signal to Noise Ratio (PSNR) of watermark and image quality poverty in unreliable quantity. This paper offers a technique based on Back propagation Neural Network to instruct a given cover image to construct a preferred watermark image.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, Z. F., J. J. Shuai, F. J. Tian, W. Y. Li, S. H. Zang, and X. Z. Zhang. "An Improved Privacy Protection Algorithm for Multimodal Data Fusion." Scientific Programming 2022 (August 23, 2022): 1–7. http://dx.doi.org/10.1155/2022/4189148.

Full text
Abstract:
With the rapid development of Internet technology, the use and sharing of data have brought great opportunities and challenges to mankind. On the one hand, the development of data sharing and analysis technology has promoted the improvement of economic and social benefits. On the other hand, protecting private information has become an urgent issue in the Internet era. In addition, the amount and type of information data are also increasing. At present, most algorithms can only encrypt a single type of small-scale data, which cannot meet the current data environment. Therefore, it is very necessary to study the privacy protection algorithm of multimodal data fusion. To improve the security of privacy protection algorithm, combined with the idea of multimode, this paper combines the improved traditional spatial steganography algorithm LSB matching method and the improved traditional transform domain steganography algorithm DCT with AES encryption algorithm after modifying the S-box and then combines it with image stitching technology, so as to realize a safe and reliable privacy protection algorithm of multimode information fusion. The algorithm completes the hidden communication of private information, which not only ensures that the receiver can accurately recover private information in the process of information transmission but also greatly improves the security of private information transmission.
APA, Harvard, Vancouver, ISO, and other styles
48

Ankush, R. Patil* V. K. Patil. "A REVIEW OF IMAGE WATERMARKING METHODS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 127–33. https://doi.org/10.5281/zenodo.56916.

Full text
Abstract:
Due to the recent progress in internet technology and evolution of very high speed networks operating everywhere, protection of digital content is must. So, it has become a tough task to protect copyright of an individual&#39;s creation. The purpose of digital watermarking is to incorporate concealed information in multimedia content to ensure a security amenity or simply a labeling application. This paper then categorizes the various watermarking techniques into numerous categories dependent upon the domain in which the concealed data is inserted. We have also provided the comparative analysis of these techniques that can help us to know the positive and negative of these techniques. This comparison can further be used to improvise and propose various new techniques for the same. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
49

N. Riharika and Dr K. Santhi Sree. "Innovative Approaches in Modern Steganography for Strengthening Data Security." International Journal of All Research Education and Scientific Methods 13, no. 05 (2025): 3390–97. https://doi.org/10.56025/ijaresm.2025.1305253390.

Full text
Abstract:
With the rising need for secure data transmission, steganography has turned out as significant technology for stealthy communication. Traditional steganographic methods follow the fixed encoding strategies, which makes them easily susceptible to steganalysis attacks. This project proposes an adaptive multimedia steganography system where the secret information is embedded in the form of images, audios, or videos by utilizing machine learning to dynamically select the most suitable encoding methods. The system extracts and analyze the key features of the chosen media type such as image complexity, motion characteristics, color mean, Edge density, Spatial complexity, spectral centroid, spectral bandwidth, RMS, pitch, Motion Intensity to decide the most suitable and secure encoding method. It encompasses modern encoding methods such as Least Significant Bit(LSB), Discrete Wavelet Transform(DWT), Discrete Cosine Transform(DCT), Phase Coding, Echo Hiding, Frame encoding. A machine learning model (Random Forest) is trained to recommend the most suitable encoding method based on extracted key features to maintain both security and imperceptibility. A GUI- based application is developed to provide an interactive user interface, where it allows the users to input the secret data, upload media file, encode the message using recommended encoding method, and decode them on the receiver’s end. The proposed system has lot of applications in secure communication, digital forensics, copyright protection, armed forces, and covert data transmission in various domains.
APA, Harvard, Vancouver, ISO, and other styles
50

S, Skandha Deepsita, Dhayala Kumar M, and Noor Mahammad SK. "Energy Efficient Error Resilient Multiplier Using Low-power Compressors." ACM Transactions on Design Automation of Electronic Systems 27, no. 3 (2022): 1–26. http://dx.doi.org/10.1145/3488837.

Full text
Abstract:
The approximate hardware design can save huge energy at the cost of errors incurred in the design. This article proposes the approximate algorithm for low-power compressors, utilized to build approximate multiplier with low energy and acceptable error profiles. This article presents two design approaches (DA1 and DA2) for higher bit size approximate multipliers. The proposed multiplier of DA1 have no propagation of carry signal from LSB to MSB, resulted in a very high-speed design. The increment in delay, power, and energy are not exponential with increment of multiplier size ( n ) for DA1 multiplier. It can be observed that the maximum combinations lie in the threshold Error Distance of 5% of the maximum value possible for any particular multiplier of size n . The proposed 4-bit DA1 multiplier consumes only 1.3 fJ of energy, which is 87.9%, 78%, 94%, 67.5%, and 58.9% less when compared to M1, M2, LxA, MxA, accurate designs respectively. The DA2 approach is recursive method, i.e., n -bit multiplier built with n/2-bit sub-multipliers. The proposed 8-bit multiplication has 92% energy savings with Mean Relative Error Distance (MRED) of 0.3 for the DA1 approach and at least 11% to 40% of energy savings with MRED of 0.08 for the DA2 approach. The proposed multipliers are employed in the image processing algorithm of DCT, and the quality is evaluated. The standard PSNR metric is 55 dB for less approximation and 35 dB for maximum approximation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!