• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 157
Next 10 →

An LSB Data Hiding Technique Using Natural Numbers

by Ipan Dey, Ajith Abraham, Sugata Sanyal
"... In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1] based on decomposition of a number (pixel-value) in sum of natural numbers. This particular representation again generates a different set of (virt ..."
Abstract - Cited by 7 (3 self) - Add to MetaCart
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1] based on decomposition of a number (pixel-value) in sum of natural numbers. This particular representation again generates a different set

An LSB Data Hiding Technique Using Prime Numbers

by Ipan Dey, Ajith Abraham, Sugata Sanyal
"... In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically model and generalize our approach. Then we propose our novel technique, based on decomposition of a number (pixel-value) i ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically model and generalize our approach. Then we propose our novel technique, based on decomposition of a number (pixel

Improved LSB based Steganography Techniques for Color Images

by Mamta Juneja , Dr Parvinder , S Sandhu - in Spatial Domain‖, IJ Network Security , 2014
"... Abstract-This paper proposes an improved LSB(least Significant bit) based Steganography technique for images imparting better information security .It presents an embedding algorithm for hiding encrypted messages in nonadjacent and random pixel locations in edges and smooth areas of images. It firs ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract-This paper proposes an improved LSB(least Significant bit) based Steganography technique for images imparting better information security .It presents an embedding algorithm for hiding encrypted messages in nonadjacent and random pixel locations in edges and smooth areas of images

A further study on steganalysis of LSB matching by calibration

by Xiaolong Li, Tieyong Zeng, Bin Yang - in [Proc. IEEE International Conference on Image Processing , 2008
"... In this paper, based on a careful investigation on the calibration (downsample) technique, we improve two detectors for detecting LSB matching: Calibrated HCF COM and Calibrated Adjacency HCF COM. Instead of using the COM (center of mass) of the HCF (histogram characteristic function), we consider t ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
In this paper, based on a careful investigation on the calibration (downsample) technique, we improve two detectors for detecting LSB matching: Calibrated HCF COM and Calibrated Adjacency HCF COM. Instead of using the COM (center of mass) of the HCF (histogram characteristic function), we consider

An Implementation of LSB Steganography Using DWT Technique

by G. Raj Kumar, M. Maruthi, Prasada Reddy, T. Lalith Kumar
"... Abstract — Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In steganography, there is a technique in which the least significant bit is modified to hide the secret message, known as the least significant bit (LSB) steganography. Le ..."
Abstract - Add to MetaCart
Abstract — Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In steganography, there is a technique in which the least significant bit is modified to hide the secret message, known as the least significant bit (LSB) steganography

Reversible data hiding using the companding technique and improved

by Shaowei Weng, Yao Zhao, Jeng-shyang Pan, Rongrong Ni, S. Weng, Y. Zhao, R. Ni, Y. Zhao, R. Ni, J. -s. Pan - DE method,” Circuits, Systems, and Signal Processing , 2008
"... Abstract A novel reversible data hiding scheme based on the companding technique and an improved difference expansion (DE) method is presented in this article. The companding technique is employed to embed payload into high frequency bands in the integer wavelet transform (IWT) domain. A refined met ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract A novel reversible data hiding scheme based on the companding technique and an improved difference expansion (DE) method is presented in this article. The companding technique is employed to embed payload into high frequency bands in the integer wavelet transform (IWT) domain. A refined

Image Steganography Using Edge Adaptive technique with LSB Matching

by J. R. Kharche, V. N. Ghodke
"... Abstract—The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. It is shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision. The new steganalytic ..."
Abstract - Add to MetaCart
of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis. In this paper, we expand the LSB matching revisited image steganography

An Optimum Modified Bit Plane Splicing LSB Algorithm for Secret Data Hiding

by M. Naseem, Ibrahim M. Hussain, M. Kamran Khan, Aisha Ajmal
"... In this paper, we propose an algorithm called Optimum Intensity Based Distributed Hiding (OIBDH) for secret data hiding inside cover images. The algorithm is a modified version of Bit Plane Splicing LSB technique with better hidden capacity and improved embedding process. The proposed algorithm outp ..."
Abstract - Add to MetaCart
In this paper, we propose an algorithm called Optimum Intensity Based Distributed Hiding (OIBDH) for secret data hiding inside cover images. The algorithm is a modified version of Bit Plane Splicing LSB technique with better hidden capacity and improved embedding process. The proposed algorithm

Stegnography Using Interpolation and LSB With cryptography on Video Images

by Www. Iasir. Net, Jagdeep Kaur
"... Abstract: Steganography or Stego as it is often referred to in the IT community, literally means, "covered writing " which is derivative from the Greek language. The term Steganography is defined as the art and science of communicating in a mode which hides the subsistence of the communica ..."
Abstract - Add to MetaCart
enemy to even detect that there is a second message present. It is a budding area which is used for protected data transmission over any public medium. This is a study of novel approach of image Steganography based on LSB (Least Significant Bit) insertion and cryptography technique for the lossless jpeg

Separable Reversible Data Hiding Using Blowfish Algorithm

by Rakesh D. Desale, Yogesh S. Patil
"... Abstract — Today’s world is the world of internet and social networking. The use of data exchange, multimedia applications, and images that contains data over the internet has been tremendously increased. Hence the need of information (data) security becomes necessary and becomes an important issue. ..."
Abstract - Add to MetaCart
. The additional data is embedded (hide) into an image using another well known technique called LSB method. The blowfish algorithm uses a variable length key from 32 bits to 448 bit. It is a Feistel network that simply iterates the encryption function 16 times. By using Blowfish and LSB together, the PSNR
Next 10 →
Results 1 - 10 of 157
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University