2007
DOI: 10.1016/j.cviu.2006.11.002
|View full text |Cite
|
Sign up to set email alerts
|

A new steganographic method for color and grayscale image hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0
3

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(25 citation statements)
references
References 17 publications
0
22
0
3
Order By: Relevance
“…It is defined as: ) ( MSE C log 10 PSNR 2 max 10 (7) where MSE denotes Mean Square Error which is given as: ) ( Many authors [39,42,81,82,83,84], consider C max =255 as a default value for 8-bit images. It can be the case, for instance, that the examined image has only up to 253 or fewer representations of gray colours.…”
Section: Analysis and Recommendationsmentioning
confidence: 99%
“…It is defined as: ) ( MSE C log 10 PSNR 2 max 10 (7) where MSE denotes Mean Square Error which is given as: ) ( Many authors [39,42,81,82,83,84], consider C max =255 as a default value for 8-bit images. It can be the case, for instance, that the examined image has only up to 253 or fewer representations of gray colours.…”
Section: Analysis and Recommendationsmentioning
confidence: 99%
“…The schemes that depends on a key needs to be shared with the recipient, while dealing with the schemes which do not use any key their robustness of the embedding architecture relays on the type of algorithm used. On simple words it refers to the positioning of data in a particular random sequence such as raster [10,[16][17][18], or any other random scan [13,21,22]. The proposed work inherits the randomness through the upper nibble of the respective pixel and scrambles the data accordingly.…”
Section: Related Workmentioning
confidence: 99%
“…A successful eavesdropping attempt to a steganographic scheme is to detect and sometimes retrieve the hidden message where as in copyright protection it is not enough to detect but remove the mark. An efficient steganographic scheme should have high imperceptibility, randomization and capacity.In this paper we propose few novel steganographic schemes in Image steganography [8,17,18,19] which improvise the randomization [20]. The main idea of the schemes stated in this paper is based on the principle of embedding the data in the bits of least significant nibble (LSN) by considering the data bits present in the most significant nibble (MSN).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…But this system cannot forestall the unintended users to identify the transmission of message. STEGANOGRAPHY [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19], a sib of the previous technique evolved later which hides the message in unsuspicious cover and provides better security by making the communication invisible. In fact the term steganography in linguistic form is in use centuries ago which cites the usage of Invisible inks, wax tablets etc [17].…”
Section: Introductionmentioning
confidence: 99%