Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: COLOR IMAGE STEGANOGRAPHY.

Artykuły w czasopismach na temat „COLOR IMAGE STEGANOGRAPHY”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „COLOR IMAGE STEGANOGRAPHY”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Xu, Meng, Xiangyang Luo, Jinwei Wang, and Hao Wang. "Color image steganalysis based on quaternion discrete cosine transform." Electronic Research Archive 31, no. 7 (2023): 4102–18. http://dx.doi.org/10.3934/era.2023209.

Pełny tekst źródła
Streszczenie:
<abstract> <p>With the rapid development and application of Internet technology in recent years, the issue of information security has received more and more attention. Digital steganography is used as a means of secure communication to hide information by modifying the carrier. However, steganography can also be used for illegal acts, so it is of great significance to study steganalysis techniques. The steganalysis technology can be used to solve the illegal steganography problem of computer vision and engineering applications technology. Most of the images in the Internet are col
Style APA, Harvard, Vancouver, ISO itp.
2

Sundos A. Hameed Al-azawi and Abbas A. AbulHameed. "Information Hiding in Color Image Using Steganographic technique." Journal of the College of Basic Education 17, no. 70 (2022): 113–22. http://dx.doi.org/10.35950/cbej.vi.8480.

Pełny tekst źródła
Streszczenie:
Steganography is one of the important research subjects in the field of information security. It enables secret communication by embedding messages in the texts, images, audio, video files or other digital carriers. Among all the image information hiding methods, LSB embedding is widely used for its high hiding capacity and it is with great significance to detect the images with hidden messages produced by LSB embedding effectively, accurately and reliably. Therefore, many experts made efforts on the LSB steganography and steganalysis research over the years. This research presents a steganogr
Style APA, Harvard, Vancouver, ISO itp.
3

Alwan, Zena Ahmed, Hamid Mohammed Farhan, and Siraj Qays Mahdi. "Color image steganography in YCbCr space." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 202. http://dx.doi.org/10.11591/ijece.v10i1.pp202-209.

Pełny tekst źródła
Streszczenie:
Steganography is a best method for in secret communicating information during the transference of data. Images are an appropriate method that used in steganography can be used to protection the simple bits and pieces. Several systems, this one as color scale images steganography and grayscale images steganography, are used on color and store data in different techniques. These color images can have very big amounts of secret data, by using three main color modules. The different color modules, such as 
 HSV-(hue, saturation, and value), RGB-(red, green, and blue), 
 YCbCr-(luminance
Style APA, Harvard, Vancouver, ISO itp.
4

Mohammed Zaki, Hassan. "Color Pattern Steganography in Images." Technium: Romanian Journal of Applied Sciences and Technology 9 (April 21, 2023): 60–65. http://dx.doi.org/10.47577/technium.v9i.8337.

Pełny tekst źródła
Streszczenie:
Text steganography into images is one of the important strategies that are used to hide the transmitted secret messages via internet connections. Most of the proposed methods required mapping key to recover the hidden secret messages and implement more complex algorithms in hiding and recovering processes. The paper proposed an improved method to hide text in image cove based on the color pattern of the cover image. It based on the sequence of the new occurrence of the color. The results showed that the proposed method has high performance in hiding with extremely low PSNR(<0.002). The low
Style APA, Harvard, Vancouver, ISO itp.
5

Zhang, Shanqing, Shengqi Su, Li Li, Qili Zhou, Jianfeng Lu, and Chin-Chen Chang. "An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography." Symmetry 11, no. 9 (2019): 1152. http://dx.doi.org/10.3390/sym11091152.

Pełny tekst źródła
Streszczenie:
Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis possible. A coverless steganographic approach without any modification for transmitting secret color image is proposed. We propose a diversity image style transfer network using multilevel noise encoding. The network consists of a generator and a loss
Style APA, Harvard, Vancouver, ISO itp.
6

Eyssa, Asmaa Abdelmonem, Fathi Elsaid Abdelsamie, and Abdelaziz Elsaid Abdelnaiem. "An Efficient Image Steganography Approach over Wireless Communication System." Wireless Personal Communications 110, no. 1 (2019): 321–37. http://dx.doi.org/10.1007/s11277-019-06730-2.

Pełny tekst źródła
Streszczenie:
Abstract This paper presents a robust color image steganography approach for image communication over wireless communication systems. The objective of this approach is to hide three color images in one color cover image to increase the capacity of hiding as most previously published steganography approaches suffer from a capacity problem. Moreover, the investigation of wireless communication of steganography images is presented in this paper to study the sensitivity of extraction of hidden images to the channel degradation effects, which is not studied appropriately in the literature. The prop
Style APA, Harvard, Vancouver, ISO itp.
7

PourArian, Mohammad Rasoul, and Ali Hanani. "Blind Steganography in Color Images by Double Wavelet Transform and Improved Arnold Transform." Indonesian Journal of Electrical Engineering and Computer Science 3, no. 3 (2016): 586. http://dx.doi.org/10.11591/ijeecs.v3.i3.pp586-600.

Pełny tekst źródła
Streszczenie:
<p>Steganography is a method which can put data into a media without a tangible impact on the cover media. In addition, the hidden data can be extracted with minimal differences. In this paper, two-dimensional discrete wavelet transform is used for steganography in 24-bit color images. This steganography is of blind type that has no need for original images to extract the secret image. In this algorithm, by the help of a structural similarity (SSIM) and a two-dimensional correlation coefficient, it is tried to select part of sub-band cover image instead of embedding location. These sub-b
Style APA, Harvard, Vancouver, ISO itp.
8

Shao, Guoqiang, Longmei Jie, and Dan Shen. "A Novel Steganography Scheme for Color Image Based on HLS Translation." Journal of Physics: Conference Series 2025, no. 1 (2021): 012058. http://dx.doi.org/10.1088/1742-6596/2025/1/012058.

Pełny tekst źródła
Streszczenie:
Abstract In recent years, steganography has attracted extensive attention, but most of steganography schemes are aimed at grayscale images. Therefore, a novel steganography scheme for color image based on HLS translation is proposed in this paper. Firstly, the color cover image is decomposed from RGB three channels to HLS three channels. Then the image of H channel is selected as the cover image for embedding secret information due to its texture feature of original image. The universal distortion function UNIWARD is utilized to embed the secret information into the image of H channel. Finally
Style APA, Harvard, Vancouver, ISO itp.
9

Xiao, Hong, and Panchi Li. "Quantum steganography based on reflected gray code for color images." Intelligent Decision Technologies 14, no. 3 (2020): 291–312. http://dx.doi.org/10.3233/idt-190034.

Pełny tekst źródła
Streszczenie:
Digital steganography is the art and science of hiding information in covert channels, so as to conceal the information and prevent the detection of hidden messages. On the classic computer, the principle and method of digital steganography has been widely and deeply studied, and has been initially extended to the field of quantum computing. Quantum image steganography is a relatively active branch of quantum image processing, and the main strategy currently used is to modify the LSB of the cover image pixels. For the existing LSB-based quantum image steganography schemes, the embedding capaci
Style APA, Harvard, Vancouver, ISO itp.
10

Hutapea, Destri Yanti, and Octaviani Hutapea. "WATERMARKING METHOD OF REMOTE SENSING DATA USING STEGANOGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT HIDING." International Journal of Remote Sensing and Earth Sciences (IJReSES) 15, no. 1 (2018): 63. http://dx.doi.org/10.30536/j.ijreses.2018.v15.a2824.

Pełny tekst źródła
Streszczenie:
Remote sensing satellite imagery is currently needed to support the needs of information in various fields. Distribution of remote sensing data to users is done through electronic media. Therefore, it is necessary to make security and identity on remote sensing satellite images so that its function is not misused. This paper describes a method of adding confidential information to medium resolution remote sensing satellite images to identify the image using steganography technique. Steganography with the Least Significant Bit (LSB) method is chosen because the insertion of confidential informa
Style APA, Harvard, Vancouver, ISO itp.
11

Kang, Yuhan, Fenlin Liu, Chunfang Yang, Lingyun Xiang, Xiangyang Luo, and Ping Wang. "Color image steganalysis based on channel gradient correlation." International Journal of Distributed Sensor Networks 15, no. 5 (2019): 155014771985203. http://dx.doi.org/10.1177/1550147719852031.

Pełny tekst źródła
Streszczenie:
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the others, but it fails to utilize the correlation between the gradient amplitudes of different color channels. Therefore, this article points out that the color image steganography weakens the correlation between the gradient amplitudes of different color channels and proposes a color image steganalysis algorithm based on channel gradient correlati
Style APA, Harvard, Vancouver, ISO itp.
12

Mahmood, Ahlam Fadhil, Nada Abdul Kanai, and Sana Sami Mohmmad. "An FPGA Implementation of Secured Steganography Communication System." Tikrit Journal of Engineering Sciences 19, no. 4 (2012): 14–23. http://dx.doi.org/10.25130/tjes.19.4.02.

Pełny tekst źródła
Streszczenie:
Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB) matching of Steganography embedding and extracting method.In a proposed steganography hardware approach, Lin
Style APA, Harvard, Vancouver, ISO itp.
13

Goel, A., V. Deswal, and S. Chhabra. "A Novel Digital Color Image Steganography using Discrete Wavelet Transform (Digital Color Image Steganography using DWT)." International Journal of Computer Sciences and Engineering 7, no. 3 (2019): 266–70. http://dx.doi.org/10.26438/ijcse/v7i3.266270.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Li, Panchi, and Xiande Liu. "A novel quantum steganography scheme for color images." International Journal of Quantum Information 16, no. 02 (2018): 1850020. http://dx.doi.org/10.1142/s021974991850020x.

Pełny tekst źródła
Streszczenie:
In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme
Style APA, Harvard, Vancouver, ISO itp.
15

Zhou, Ri-Gui, Wenwen Hu, Ping Fan, and Gaofeng Luo. "Quantum color image watermarking based on Arnold transformation and LSB steganography." International Journal of Quantum Information 16, no. 03 (2018): 1850021. http://dx.doi.org/10.1142/s0219749918500211.

Pełny tekst źródła
Streszczenie:
In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be [Formula: see text] and [Formula: see text], respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on
Style APA, Harvard, Vancouver, ISO itp.
16

Kumar, Vijay, and Dinesh Kumar. "Performance Evaluation of Modified Color Image Steganography Using Discrete Wavelet Transform." Journal of Intelligent Systems 28, no. 5 (2017): 749–58. http://dx.doi.org/10.1515/jisys-2017-0134.

Pełny tekst źródła
Streszczenie:
Abstract Steganography is the foremost influential approach to hide data. Images serve as the most appropriate cover media for steganography. This paper intends to do a performance evaluation of color images and its comparison with the recently proposed approaches, using the modified technique already proposed for grayscale images, by the authors. This approach hides large data in color image using the blocking concept. The blocking process is applied on approximation coefficients of secret image and detail coefficients of red, green and blue components of cover image. The blocks of detail coe
Style APA, Harvard, Vancouver, ISO itp.
17

Newaj Bhuiyan, Sharif Shah, Norun Abdul Malek, Othman Omran Khalifa, and Farah Diyana Abdul Rahman. "An Improved Image Steganography Algorithm Based on PVD." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (2018): 569. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp569-577.

Pełny tekst źródła
Streszczenie:
In this paper, a modification of PVD (Pixel value differencing) algorithm is used for Image Steganography in spatial domain. It is normalizing secret data value by encoding method to make the new pixel edge difference less among three neighbors (horizontal, vertical and diagonal) and embedding data only to less intensity pixel difference areas or regions. The proposed algorithm shows a good improvemernt for both color and gray-scale images compared to other algorithms. Color images performance are better than gray images. However, in this work the focus is mainly on gray images. The strenght o
Style APA, Harvard, Vancouver, ISO itp.
18

Abbasi, Mahdi. "Color Image Steganography using Dual Wavelet Transforms." International Journal of Computer Applications 181, no. 47 (2019): 32–38. http://dx.doi.org/10.5120/ijca2019918639.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Gaikwad, D. P., and S. J. Wagh. "Color Image Restoration for an Effective Steganography." i-manager's Journal on Software Engineering 4, no. 3 (2010): 65–71. http://dx.doi.org/10.26634/jse.4.3.1119.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Hameed, Sarab M., Sura N. Abdula, and Fatin A. Dawood. "Image Steganography in De-Correlated Color Spaces." Journal of Al-Nahrain University Science 9, no. 1 (2006): 34–40. http://dx.doi.org/10.22401/jnus.9.1.06.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Bishen, Shivansh, Paurav Malik, Saloni Rao, and Prakash Biswagar. "Signature Text,Image and Audio Hiding in a Color Image using Steganography and Cryptography." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 709–20. http://dx.doi.org/10.51201/jusst/21/05337.

Pełny tekst źródła
Streszczenie:
Data Transmission in network security is one of the foremost vital issues in today’s communication world. the end result of that’s that Data security has gained utmost importance because of the unprecedented increase within the data generated over the web, which could be a basic necessity of any application in information technology. The vigorous growth within the field of data communication has made information transmission much easier. But this kind of advancement has opened many possibilities of data being snooped. So, day-by-day maintaining of data security is becoming an inseparable part
Style APA, Harvard, Vancouver, ISO itp.
22

Wibisono, Gunawan, Tri Waluyo, and Erik Iman Heri Ujianto. "KAJIAN METODE METODE STEGANOGRAFI PADA DOMAIN SPASIAL." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 2 (2020): 259–64. http://dx.doi.org/10.33480/jitk.v5i2.1212.

Pełny tekst źródła
Streszczenie:
This paper contains a review of the spatial domain steganographic literature. The purpose of this paper is to provide knowledge about techniques or methods that exist in the spatial domain of steganography. Steganography is the science or technique for hiding secret messages in other messages so that the existence of the secret message cannot be accessed by others who do not have authority. There are several popular spatial domains of steganographic techniques, namely LSB (Least Significant Bit), which is mapping secret message bits in the rightmost bit (LSB) of each color pixel and PVD (Pixel
Style APA, Harvard, Vancouver, ISO itp.
23

Heidari, Shahrokh, Mohammad Rasoul Pourarian, Reza Gheibi, Mosayeb Naseri, and Monireh Houshmand. "Quantum red–green–blue image steganography." International Journal of Quantum Information 15, no. 05 (2017): 1750039. http://dx.doi.org/10.1142/s0219749917500393.

Pełny tekst źródła
Streszczenie:
One of the most considering matters in the field of quantum information processing is quantum data hiding including quantum steganography and quantum watermarking. This field is an efficient tool for protecting any kind of digital data. In this paper, three quantum color images steganography algorithms are investigated based on Least Significant Bit (LSB). The first algorithm employs only one of the image’s channels to cover secret data. The second procedure is based on LSB XORing technique, and the last algorithm utilizes two channels to cover the color image for hiding secret quantum data. T
Style APA, Harvard, Vancouver, ISO itp.
24

Shahi, D., R. S. Vinod Kumar, and V. K. Reshma. "High Capacity Reversible Steganography on CMY and HSI Color Images Using Image Interpolation." Webology 18, Special Issue 04 (2021): 133–48. http://dx.doi.org/10.14704/web/v18si04/web18119.

Pełny tekst źródła
Streszczenie:
Steganography using image interpolation has created a new research area in multimedia communication. A reversible data concealing in HSI and CMY color models using image interpolation is proposed in this paper. The HSI and CMY image models are interpolated using High Capacity Reversible Steganography (CRS) technique. The median plane of both HSI and CMY color models are selected for secret message bit concealing. The secret message bits are concealed in the cover plane by Exclusive OR (XOR) operation. Since the cover image is recovered after secret message bit retrieval, this finds application
Style APA, Harvard, Vancouver, ISO itp.
25

Abdullah, Hikmat N., Sura F. Yousif, and Alejandro A. Valenzuela. "Efficient Steganography Scheme for Color Images based on Wavelets and Chaotic Maps." Iraqi Journal of Information & Communications Technology 2, no. 4 (2020): 11–20. http://dx.doi.org/10.31987/ijict.2.4.86.

Pełny tekst źródła
Streszczenie:
In this paper, a combination of spatial domain as well as transformation domain with the aid of chaotic sequences is used to propose an efficient steganography scheme for color images. The transform domain uses Discrete Wavelet Transform (DWT) for embedding the cover and secret images. Chaotic sequences are used for two purposes: first, to scramble the secret color image before hiding. Second, to randomly select the locations of the cover image for embedding. The two images are then merged together into a single image and the stego image is formed by applying IDWT. The secret image is extracte
Style APA, Harvard, Vancouver, ISO itp.
26

Rahman, Shahid, Jamal Uddin, Hameed Hussain, et al. "Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats." Sustainability 15, no. 5 (2023): 4252. http://dx.doi.org/10.3390/su15054252.

Pełny tekst źródła
Streszczenie:
The Internet and Big Data expansion have motivated the requirement for more generous stockpiling to hold and share information. Against the current era of information, guaranteeing protection and security to individuals sending data to each other is of utmost importance. The only file type that is instantly and widely used is the image. Therefore, to secure transmission, it is necessary to develop a mechanism to safeguard user data transmission. Considering this thought, it is necessary to analyze the best file type of image for essential criteria of image steganography, such as Payload, Robus
Style APA, Harvard, Vancouver, ISO itp.
27

S, Hemalatha, Dinesh Acharya U, Renuka A, and Priya R. Kamath. "A Secure Color Image Steganography in Transform Domain." International Journal on Cryptography and Information Security 3, no. 1 (2013): 17–24. http://dx.doi.org/10.5121/ijcis.2013.3103.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Zeng, Lu, Ning Yang, Xiang Li, Aidong Chen, Hongyuan Jing, and Jiancheng Zhang. "Advanced Image Steganography Using a U-Net-Based Architecture with Multi-Scale Fusion and Perceptual Loss." Electronics 12, no. 18 (2023): 3808. http://dx.doi.org/10.3390/electronics12183808.

Pełny tekst źródła
Streszczenie:
Image-to-image steganography refers to the practice of hiding secret image within a cover image, serving as a crucial technique for secure communication and data protection. Existing image-to-image generative adversarial network-based steganographic methods for image hiding demonstrate a high embedding capacity. However, there is still significant room for improvement in terms of the quality of the stego images and the extracted secret images. In this study, we propose an architecture for inconspicuously hiding an image within the Y channel of another image, leveraging a U-Net network and a mu
Style APA, Harvard, Vancouver, ISO itp.
29

Kan, O. A., N. A. Mazhenov, K. B. Kopbalina, and G. B. Turebaeva. "Method for hiding text data in an image." Bulletin of the Innovative University of Eurasia 83, no. 1 (2021): 72–79. http://dx.doi.org/10.37788/2021-3/72-79.

Pełny tekst źródła
Streszczenie:
The main problem: The article deals with the issues of hiding text information in a graphic file. A formula for hiding text information in image pixels is proposed. A steganography scheme for embedding secret text in random image pixels has been developed. Random bytes are pre-embedded in each row of pixels in the source image. As a result of the operations performed, a key image is obtained. The text codes are embedded in random bytes of pixels of a given RGB channel. To form a secret message, the characters of the ASCII code table are used. Demo encryption and decryption programs have been d
Style APA, Harvard, Vancouver, ISO itp.
30

MISHRA, D. C., HIMANI SHARMA, R. K. SHARMA, and NAVEEN KUMAR. "A FIRST CRYPTOSYSTEM FOR SECURITY OF TWO-DIMENSIONAL DATA." Fractals 25, no. 01 (2017): 1750011. http://dx.doi.org/10.1142/s0218348x17500116.

Pełny tekst źródła
Streszczenie:
In this paper, we present a novel technique for security of two-dimensional data with the help of cryptography and steganography. The presented approach provides multilayered security of two-dimensional data. First layer security was developed by cryptography and second layer by steganography. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. This paper proposes a novel approach for encryption and decryption of information in the form of Word Data (.doc file), PDF document (.pdf file), Text document, Gray-scale ima
Style APA, Harvard, Vancouver, ISO itp.
31

Yang, Chunfang, Yuhan Kang, Fenlin Liu, Xiaofeng Song, Jie Wang, and Xiangyang Luo. "Color image steganalysis based on embedding change probabilities in differential channels." International Journal of Distributed Sensor Networks 16, no. 5 (2020): 155014772091782. http://dx.doi.org/10.1177/1550147720917826.

Pełny tekst źródła
Streszczenie:
It is a potential threat to persons and companies to reveal private or company-sensitive data through the Internet of Things by the color image steganography. The existing rich model features for color image steganalysis fail to utilize the fact that the content-adaptive steganography changes the pixels in complex textured regions with higher possibility. Therefore, this article proposes a variant of spatial rich model feature based on the embedding change probabilities in differential channels. The proposed feature is extracted from the residuals in the differential channels to reduce the ima
Style APA, Harvard, Vancouver, ISO itp.
32

L. Hussein, Hussein. "Hiding Data in Color Image Using Least Significant Bits of Blue Sector." Ibn AL- Haitham Journal For Pure and Applied Science 31, no. 2 (2018): 193. http://dx.doi.org/10.30526/31.2.1948.

Pełny tekst źródła
Streszczenie:
Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red,
Style APA, Harvard, Vancouver, ISO itp.
33

Tang, Lili, Dongrui Wu, Honghui Wang, Mingzhi Chen, and Jialiang Xie. "An adaptive fuzzy inference approach for color image steganography." Soft Computing 25, no. 16 (2021): 10987–1004. http://dx.doi.org/10.1007/s00500-021-05825-y.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Hsieh, Ku-Sung, and Chung-Ming Wang. "Constructive image steganography using example-based weighted color transfer." Journal of Information Security and Applications 65 (March 2022): 103126. http://dx.doi.org/10.1016/j.jisa.2022.103126.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Liao, Xin, Yingbo Yu, Bin Li, Zhongpeng Li, and Zheng Qin. "A New Payload Partition Strategy in Color Image Steganography." IEEE Transactions on Circuits and Systems for Video Technology 30, no. 3 (2020): 685–96. http://dx.doi.org/10.1109/tcsvt.2019.2896270.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Thanki, Rohit, and Surekha Borra. "A color image steganography in hybrid FRT–DWT domain." Journal of Information Security and Applications 40 (June 2018): 92–102. http://dx.doi.org/10.1016/j.jisa.2018.03.004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Astuti, E. Z., D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, and Md K. Sarker. "LSB-based Bit Flipping Methods for Color Image Steganography." Journal of Physics: Conference Series 1501 (March 2020): 012019. http://dx.doi.org/10.1088/1742-6596/1501/1/012019.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

El Rezen Purba, Doni, and Desinta Purba. "Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security." Jurnal Info Sains : Informatika dan Sains 11, no. 1 (2021): 1–4. http://dx.doi.org/10.54209/infosains.v11i1.18.

Pełny tekst źródła
Streszczenie:
For a secret message to be read and understood by a specific person only, a way is needed to hide the message, namely by steganography. Steganography is the concealment of secret messages in other media, such as images, audio, or video, so that the media inserted into the message looks as usual. Digital photos are one of the container media that are widely used for data hiding. However, when processing images such as compression, rotation, noise, and so on, confidential messages in the picture are prone to damage or loss. Then it takes the correct steganography method to hide secret messages i
Style APA, Harvard, Vancouver, ISO itp.
39

Abbass, Ahmed Abdulrudah, Salam Al-augby, Hussein Lafta Hussein, Jasim Hussein Kaabi, and Robert Tornai. "American standard code for information interchange mapping technique for text hiding in the RGB and gray images." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2812. http://dx.doi.org/10.11591/ijece.v12i3.pp2812-2817.

Pełny tekst źródła
Streszczenie:
<span>One of the significant techniques for hiding important information (such as text, image, and audio) is steganography. Steganography is used to keep this information as secret as possible, especially the sensitive ones after the massive expansion of data transmission through the Internet inside a conventional, non-secret, file, or message. This paper uses the American standard code for information interchange (ASCII) mapping technique (AMT) to hide the data in the color and grey image by converting it in a binary form, also convert the three levels of the red, green, and blue (RGB)
Style APA, Harvard, Vancouver, ISO itp.
40

Hindi, A. Y., M. O. Dwairi, and Z. A. AlQadi. "A Novel Technique for Data Steganography." Engineering, Technology & Applied Science Research 9, no. 6 (2019): 4942–45. http://dx.doi.org/10.48084/etasr.2955.

Pełny tekst źródła
Streszczenie:
In this paper, a novel stego-method will be introduced, which can be used to hide any secret message in any holding color image. The proposed method will be implemented and tested and the calculated parameters will be compared with the LSB method parameters. It will be shown that the proposed method provides a high-security level by using two keys to extract the secret message from the holding image, making it very difficult to hack.
Style APA, Harvard, Vancouver, ISO itp.
41

Alqadi, Ziad, and Mohammad S. Khrisat. "DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY." International Journal of Engineering Technologies and Management Research 7, no. 9 (2020): 31–38. http://dx.doi.org/10.29121/ijetmr.v7.i9.2020.782.

Pełny tekst źródła
Streszczenie:
LSB2 method of data steganography is one of the most popular methods used to hide secret messages in digital color image. This method keeps the quality of the holding image high but it is not secure and it can be easily hacked.
 In this paper a method of improving the security of LSB2 method will be proposed, tested and implemented. The added security issues are simple and do require extra memory and time for execution. An embedded key will be extracted from the holding image to encrypt the message, this key will be variable and depends on the selected covering image, selected message len
Style APA, Harvard, Vancouver, ISO itp.
42

Jamila, Harbi S., and Nabeel N. Zeyad. "Steganography Based Human Skin Using Wavelet Transformation in RGB Image." International Letters of Chemistry, Physics and Astronomy 52 (June 2015): 84–89. http://dx.doi.org/10.18052/www.scipress.com/ilcpa.52.84.

Pełny tekst źródła
Streszczenie:
Steganography is the art and science that enables you to hide the data in certain communication such as (video, Audio, and image). Here it doesn't scramble the data and send it, but we hide it using a color image to hide the data at the Human skin color and doing that using the cropping phrase to get the required area to hide data. In this paper, we will use the Wavelet and slant, let to process the hiding in the blue band of the RGB image and apply the DWT (discrete wavelet transformation) to get the decomposed bounds of the Cover image to use it to hide the data of the (stage) image.
Style APA, Harvard, Vancouver, ISO itp.
43

Jamila, Harbi S., and Nabeel N. Zeyad. "Steganography Based Human Skin Using Wavelet Transformation in RGB Image." International Letters of Chemistry, Physics and Astronomy 52 (June 2, 2015): 84–89. http://dx.doi.org/10.56431/p-o4ftbc.

Pełny tekst źródła
Streszczenie:
Steganography is the art and science that enables you to hide the data in certain communication such as (video, Audio, and image). Here it doesn't scramble the data and send it, but we hide it using a color image to hide the data at the Human skin color and doing that using the cropping phrase to get the required area to hide data. In this paper, we will use the Wavelet and slant, let to process the hiding in the blue band of the RGB image and apply the DWT (discrete wavelet transformation) to get the decomposed bounds of the Cover image to use it to hide the data of the (stage) image.
Style APA, Harvard, Vancouver, ISO itp.
44

Pan, Yi-Lun, and Ja-Ling Wu. "Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images." Entropy 24, no. 7 (2022): 982. http://dx.doi.org/10.3390/e24070982.

Pełny tekst źródła
Streszczenie:
Steganography is one of the most crucial methods for information hiding, which embeds secret data on an ordinary file or a cover message for avoiding detection. We designed a novel rate-distortion-based large-capacity secure steganographic system, called rate-distortion-based Stego (RD-Stego), to effectively solve the above requirement. The considered effectiveness of our system design includes embedding capacity, adaptability to chosen cover attacks, and the stability of the trained model. The proposed stego scheme can hide multiple three-channel color images and QR codes within another three
Style APA, Harvard, Vancouver, ISO itp.
45

Allah, M. I. Fath. "Chaos Based Stego Color Image Encryption." Journal of Cybersecurity and Information Management 10, no. 2 (2022): 08–18. http://dx.doi.org/10.54216/jcim.100201.

Pełny tekst źródła
Streszczenie:
Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, image encryption has become played a vital rule in information security. Many image encryption schemes have been proposed but most of them suffer from poor robustness against severe types of attacks. In this paper two proposed techniques will be presented for color image encryption to be robust to severe attacks: composite attack. One of these approaches is represented by hybrid use of both steganography and Discrete Wavelet Transform (DWT) based encryption and the other one in whi
Style APA, Harvard, Vancouver, ISO itp.
46

Zaini, H. G. "Image Segmentation to Secure LSB2 Data Steganography." Engineering, Technology & Applied Science Research 11, no. 1 (2021): 6632–36. http://dx.doi.org/10.48084/etasr.3859.

Pełny tekst źródła
Streszczenie:
A digital color image usually has a high resolution, thus its size is good enough and the image can be used as a covering (holding) image to hide secrete messages (short and long). The methods commonly used for data steganography, e.g. LSB and LSB2 are not secure, so in this paper, a method of securing the LSB2 method is proposed. The proposed method is based on wavelet packet decomposition. The levels of decomposition will be kept in secret and one of the resulting segments will be used as a covering segment. MSE, PSNR, hiding time, and extraction time will be experimentally analyzed to prove
Style APA, Harvard, Vancouver, ISO itp.
47

Al-Kadei, Faten H. MohammedSediq. "Two-level hiding an encrypted image." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (2020): 961. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp961-969.

Pełny tekst źródła
Streszczenie:
<p><span>Encryption and hiding images are becoming a hot research area and a broad prospect for application. This article uses a secure algorithm with Low Significant Bit method to hide an encrypted high-resolution color bitmap image in two selectively color images (i.e., two cover images). The paper introduces a two-level hiding encrypted image using MATLAB-GUI programming language. In the beginning, with a key image using XOR bit operation, the original RGB image is encrypted. After that, the encrypted image is hidden into the first cover image. The cover image is then hidden int
Style APA, Harvard, Vancouver, ISO itp.
48

Khaleel, Yazen A. "High Security and Capacity of Image Steganography for Hiding Human Speech Based on Spatial and Cepstral Domains." ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 8, no. 1 (2020): 95. http://dx.doi.org/10.14500/aro.10670.

Pełny tekst źródła
Streszczenie:
A new technique of hiding a speech signal clip inside a digital color image is proposed in this paper to improve steganography security and loading capacity. The suggested technique of image steganography is achieved using both spatial and cepstral domains, where the Mel-frequency cepstral coefficients (MFCCs) are adopted, as very efficient features of the speech signal. The presented technique in this paper contributes to improving the image steganography features through two approaches. First is to support the hiding capacity by the usage of the extracted MFCCs features and pitches extracted
Style APA, Harvard, Vancouver, ISO itp.
49

M.K, Shyla. "Center Pixel Based Robust Color Image Steganography for IoT Applications." Bioscience Biotechnology Research Communications 13, no. 13 (2020): 165–70. http://dx.doi.org/10.21786/bbrc/13.13/23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Jalal Yousif, Adel. "Image Steganography Based on Wavelet Transform and Color Space Approach." Diyala Journal of Engineering Sciences 13, no. 3 (2020): 23–34. http://dx.doi.org/10.24237/djes.2020.13303.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!