11 Survey of Image Steganography and Steganalysis
M Bachrach, FY Shih - Multimedia Security: Watermarking …, 2012 - api.taylorfrancis.com
The term, steganography, comes from Greek and means “covered writing”(Johnson and
Jajodia, 1998a; Petitcolas et al., 1999). The intent of steganography is to hide a message in …
Jajodia, 1998a; Petitcolas et al., 1999). The intent of steganography is to hide a message in …
A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm
GS Lin, YT Chang, WN Lie - IEEE Transactions on Multimedia, 2010 - ieeexplore.ieee.org
Picture quality and statistical undetectability are two key issues related to steganography
techniques. In this paper, we propose a closed-loop computing framework that iteratively …
techniques. In this paper, we propose a closed-loop computing framework that iteratively …
[PDF][PDF] A new approach of data hiding in images using cryptography and steganography
P Bharti, R Soni - International Journal of Computer Applications, 2012 - Citeseer
Cryptography is the science of using mathematics to encrypt and decrypt data and
Steganography is the art and science of hiding communication; a steganographic system …
Steganography is the art and science of hiding communication; a steganographic system …
Block-based SVD image watermarking in spatial and transform domains
The idea of this paper is to implement an efficient block-by-block singular value (SV)
decomposition digital image watermarking algorithm, which is implemented in both the …
decomposition digital image watermarking algorithm, which is implemented in both the …
Adaptive steganography based on block complexity and matrix embedding
In this paper, an adaptive steganography algorithm based on block complexity and matrix
embedding is proposed. The matrix embedding constructed by [8, 3],[8, 4][8, 5][8, 6] and [8 …
embedding is proposed. The matrix embedding constructed by [8, 3],[8, 4][8, 5][8, 6] and [8 …
A secure steganography for privacy protection in healthcare system
J Liu, G Tang, Y Sun - Journal of medical systems, 2013 - Springer
Private data in healthcare system require confidentiality protection while transmitting.
Steganography is the art of concealing data into a cover media for conveying messages …
Steganography is the art of concealing data into a cover media for conveying messages …
An adaptive matrix embedding for image steganography
In this paper, an adaptive matrix embedding method is proposed for grayscale images. The
2× 4 pixel block is taken as a cover unit. The local correlation of the block is used to …
2× 4 pixel block is taken as a cover unit. The local correlation of the block is used to …
Steganalysis for palette-based images using generalized difference image and color correlogram
In this paper, we attempt to propose a novel blind steganalysis algorithm for palette-based
images. First, the generalized difference images between adjacent pixels were constructed …
images. First, the generalized difference images between adjacent pixels were constructed …
Removing the costs and retaining the benefits of flash-based SSD virtualization with FSDV
Y Zhang, AC Arpaci-Dusseau… - … 31st Symposium on …, 2015 - ieeexplore.ieee.org
We present the design, implementation, and evaluation of the File System De-Virtualizer
(FSDV), a system that dynamically removes a layer of indirection common in modern storage …
(FSDV), a system that dynamically removes a layer of indirection common in modern storage …
An efficient base conversion using variable length segmentation and remainder transfer
H Zhang, X Wei, R Wang, F Meng - IEEE Signal Processing …, 2019 - ieeexplore.ieee.org
This letter addresses the problems of conversion overflows, losses, and faults in the radix
number system. Different from the fixed length truncation conversion strategy, the proposed …
number system. Different from the fixed length truncation conversion strategy, the proposed …