2016
DOI: 10.14569/ijacsa.2016.070350
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection

Abstract: Abstract-with the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. Thus, the security issue has become one of the most significant problems for distributing new information. It is necessary to protect this information while passing over insecure channels. Steganography introduces a strongly approach to hide the secret data in an appropriate media carriers such as images, audio files, tex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Embedded data should be kept away from detection to a great extent [22]- [24]. Embedded data has to be directly encoded into the media to keep data consistency [25], [26]. The following Table 1, shows the comparative analysis [1]- [11] of different hiding method using PVD techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Embedded data should be kept away from detection to a great extent [22]- [24]. Embedded data has to be directly encoded into the media to keep data consistency [25], [26]. The following Table 1, shows the comparative analysis [1]- [11] of different hiding method using PVD techniques.…”
Section: Related Workmentioning
confidence: 99%
“…-Efficiency: minimizing the encryption-decryption times, thus maximizing the process of cryptography throughput (bytes encrypted-decrypted per second) [41][42][43][44][45][46][47][48][49][50]. -Quality: The method must give good values for quality parameters measured between the source image and the encrypted one after processing the encryption phase, and between the source image and the decrypted one after processing the decryption phase [31][32][33][34][35][36][37][38][39][40]. The quality parameters used in this research are: Mean square error (MSE), peak signal to noise ratio (PSNR), and correlation coefficient (CC), these parameters can be calculated using equations 1, 2, and 3 [16].…”
Section: Introductionmentioning
confidence: 99%
“…One of the easiest techniques used to secure DCI is image steganography [60][61][62][63][64][65][66][67][68][69][70][71][72][73]. DCI steganography as shown in figure 1 means image hiding before sending it via unsecure data network and extracting after receiving from the data network [16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…Figure 1: DCI steganography process DCI steganography must hide the image in another covering image without affecting much the covering image, the stego image must be closed to the covering image and the quality parameters calculated between the covering and the stego images must satisfy the quality requirements og good stego system listed in table 1 [21][22][23][24][25][26]: The most popular method used in data steganography is least significant bit (LSB) method [60][61][62][63][64][65][66][67][68][69][70][71][72][73], this method reserves the LSBs of the covering-stego bytes to hide-extract the bits of the hidden data, The capacity hiding of LSB method is limited to the covering image size and it is equal the covering image size divided by 8 [27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%