2005
DOI: 10.1007/11596981_86
|View full text |Cite
|
Sign up to set email alerts
|

An Image Steganography Using Pixel Characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…The information can be hidden in many ways in images. To hide information, secret message insertion may encode every bit of information in the image or selectively embed the message in noisy areas, which draw less attention [15], [23]; those areas where there is great deal of natural color variation. The message may also be scattered randomly throughout the image.…”
Section: Image Steganography Techniquesmentioning
confidence: 99%
“…The information can be hidden in many ways in images. To hide information, secret message insertion may encode every bit of information in the image or selectively embed the message in noisy areas, which draw less attention [15], [23]; those areas where there is great deal of natural color variation. The message may also be scattered randomly throughout the image.…”
Section: Image Steganography Techniquesmentioning
confidence: 99%
“…These approaches can be implemented with or without a key. The approaches like using raster and random scan, space filling schemes [15] like Moore, Hilbert, pixel indicator [14,18]and MSN randomization [19] etc. fall under randomization techniques.…”
Section: Related Workmentioning
confidence: 99%
“…But this system cannot forestall the unintended users to identify the transmission of message. STEGANOGRAPHY [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19], a sib of the previous technique evolved later which hides the message in unsuspicious cover and provides better security by making the communication invisible. In fact the term steganography in linguistic form is in use centuries ago which cites the usage of Invisible inks, wax tablets etc [17].…”
Section: Introductionmentioning
confidence: 99%
“…for effective image steganography. Therefore most steganographic methods [1,2,3,4] focus on these requirements, and the embedding and extracting algorithm etc. In steganograpahic system, however, the receiver, who received the massage, wants to know whether the extracted message has integrity or not.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to that, the proposed method is able to verify the integrity of the secret information extracted from stego image. Our system is to add a module that verifies the integrity on our previous steganographic method [4].…”
Section: Introductionmentioning
confidence: 99%