2017
DOI: 10.1155/2017/5397082
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information

Abstract: This contribution proposes a novel steganographic method based on the compression standard according to the Joint Photographic Expert Group and an Entropy Thresholding technique. The steganographic algorithm uses one public key and one private key to generate a binary sequence of pseudorandom numbers that indicate where the elements of the binary sequence of a secret message will be inserted. The insertion takes eventually place at the first seven AC coefficients in the transformed DCT domain. Before the inser… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
34
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(36 citation statements)
references
References 29 publications
2
34
0
Order By: Relevance
“…At the receiver"s end at first we extract flag"s value. Based on the flag"s [10] value we get the lesser occurrences of 0"s or 1"s. In this technique [11] then how many 0"s or 1"s are present would be extracted. After this the positions where lesser number of 0"s or 1"s are present that information would be extracted.…”
Section: The Proposed Solutionmentioning
confidence: 99%
“…At the receiver"s end at first we extract flag"s value. Based on the flag"s [10] value we get the lesser occurrences of 0"s or 1"s. In this technique [11] then how many 0"s or 1"s are present would be extracted. After this the positions where lesser number of 0"s or 1"s are present that information would be extracted.…”
Section: The Proposed Solutionmentioning
confidence: 99%
“…to measure the smoothness of G. Then apply F 1 to all the blocks of M and define the two parameters R m and S m as in (22) and (23). Similarly, apply F −1 to all the blocks of M and define the two parameters R −m and S −m as in (24) and (25).…”
Section: Security Analysismentioning
confidence: 99%
“…In this method more number of bits is hidden in high textured regions as compared to low textured regions. In [25] the steganography algorithm uses a public key and a private key to generate pseudo random numbers that identify the embedding locations.…”
Section: Introductionmentioning
confidence: 99%
“…After receiving the stego image the embedded image can be take out using extraction algorithm [5]. The cover can be an image, video or audio [11].When the cover chosen as video, it is called as video steganography. For the purpose of embedding the secret message spatial domain methods and transform domain methods are used.…”
Section: Introductionmentioning
confidence: 99%