2016
DOI: 10.4236/jis.2016.73011
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Abstract: Steganography is the art of hiding a secret message in some kind of media. The main goal is not to hide only the secret message but also the existence of communication and secure data transferring. There are a lot of methods that were utilized for building the steganography; such as LSB (Least Significant Bits), Discrete Cosine Transform (DCT), Discrete Fourier Transform, Spread-Spectrum Encoding, and Perceptual Masking, but all of them are challenged by steganalysis. This paper proposes a new technique for Gr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…At present, a serious problem that affects the three-dimensional measurement of CT sequence slice imaging is that the spatial resolution of the pixels in the fault is far higher than the spatial resolution between the faults,that is the slice inner pixel is not consistent with the spatial resolution of axis direction, which makes the edge data of the interlayer slice incomplete, resulting in the low accuracy and large error of the three-dimensional measurement based on the sequence imaging (Chae S H et al2016) [9]. There are two methods that usually equate the spatial resolution of the horizontal and the axes: One way is to control the CT scanning spacing, the scanning interval between adjacent faults is reduced until the resolution is equal to the resolution within the slice (Bawaneh M J et al2016) [10]. However, as the accuracy of the detector is upgraded, and the accuracy of the ray source is improved, the quality of the reconstruction of imaging is also getting higher and higher.…”
Section: State Of the Artmentioning
confidence: 99%
“…At present, a serious problem that affects the three-dimensional measurement of CT sequence slice imaging is that the spatial resolution of the pixels in the fault is far higher than the spatial resolution between the faults,that is the slice inner pixel is not consistent with the spatial resolution of axis direction, which makes the edge data of the interlayer slice incomplete, resulting in the low accuracy and large error of the three-dimensional measurement based on the sequence imaging (Chae S H et al2016) [9]. There are two methods that usually equate the spatial resolution of the horizontal and the axes: One way is to control the CT scanning spacing, the scanning interval between adjacent faults is reduced until the resolution is equal to the resolution within the slice (Bawaneh M J et al2016) [10]. However, as the accuracy of the detector is upgraded, and the accuracy of the ray source is improved, the quality of the reconstruction of imaging is also getting higher and higher.…”
Section: State Of the Artmentioning
confidence: 99%
“…This knowledge is represented by the key of image segmentation, the key of mapping within each area segment, data distribution inside segment, key agreement of cryptography method, the key of secret message length and the key of message extension. The main limitation of this technique is limited capacity to embed secret data and imperceptibility (Bawaneh & Obei dat, 2016). For growing the capability of conceal data in RGB image, a method is used to merge the characteristics of color intensities with a Triple-A algorithm where based on randomization.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This knowledge is represented by the key of image segmentation, data distribution inside segment (area selection), the key of mapping within each area segment, key agreement of cryptography method, the key of secret message length and the key of message extension (Bawaneh and Obeidat, 2016). In this approach, a password is used to create a random seed that is used to take the first position where secret information bit is hiding.…”
Section: Hierarchy Of Steganography Domainmentioning
confidence: 99%