2006 IEEE International Conference on Engineering of Intelligent Systems 2006
DOI: 10.1109/iceis.2006.1703168
|View full text |Cite
|
Sign up to set email alerts
|

A New Genetic Algorithm Approach for Secure JPEG Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(37 citation statements)
references
References 3 publications
0
37
0
Order By: Relevance
“…Fard et al [41] state clearly that "there is currently no steganography system which can resist all steganalysis attacks". "Ultimately, image understanding is important for secure adaptive steganography.…”
Section: Originalmentioning
confidence: 99%
See 2 more Smart Citations
“…Fard et al [41] state clearly that "there is currently no steganography system which can resist all steganalysis attacks". "Ultimately, image understanding is important for secure adaptive steganography.…”
Section: Originalmentioning
confidence: 99%
“…JPEG compression uses the DCT to transform successive sub-image blocks (8x8 pixels) into 64 DCT coefficients. Data is inserted into these coefficients' insignificant bits; however, altering any single coefficient would affect the entire 64 block pixels [41]. As the change is operating on the frequency domain instead of the spatial domain there will be no visible change in the cover image given those coefficients are handled with care [42].…”
Section: Steganography In the Image Frequency Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…This function called Mean Absolute Difference (MAD) is applied by Pik-Wah as an image quality indicator for his GA-based watermark algorithm [13]. Milani Fard, A. et al [14] also combined the Outguess method and MAD, as the genetic algorithm fitness function for improving the quality of their obtained stego-image.…”
Section: The Proposed Methodsmentioning
confidence: 99%
“…Most recent researches utilize Discrete Wavelet Transform (DWT because of its wide application in the new image compression standard, JPEG2000. An example is the employment of an adaptive data embedding technique with the use of OPAP to hide data in Integer Wavelet coefficients of the cover image [9].…”
Section: B Data Hiding Techniquesmentioning
confidence: 99%