2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT) 2012
DOI: 10.1109/acsat.2012.25
|View full text |Cite
|
Sign up to set email alerts
|

An Introduction to Image Steganography Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
37
0
4

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 76 publications
(42 citation statements)
references
References 7 publications
1
37
0
4
Order By: Relevance
“…Cover file with secret message hidden constitutes the file of "stage" [3]. A Number of requirements must be satisfied when designing embedding algorithms, these are: Un-detectability, Imperceptibility, Security, Capacity and Robustness [4].…”
Section: Introductionmentioning
confidence: 99%
“…Cover file with secret message hidden constitutes the file of "stage" [3]. A Number of requirements must be satisfied when designing embedding algorithms, these are: Un-detectability, Imperceptibility, Security, Capacity and Robustness [4].…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development of digital steganography, the publication of a large number of scientific works in this area in the open sources and restriction and even the ban of the use of cryptography on the legislative level in many countries have led to an increase in the use of steganographic methods for transmitting and storing confidential information [1,2]. The main advantage of steganography compared to cryptography is the concealment of the very fact that the confidential information is present in a particular information content, which makes the use of the steganographic system the common solution for the organization of a hidden communication channel [3]. However, the goals of organizing such a channel may be different: from the harmless, concerning specific individuals, to those that threaten the stability and vitality of a group of people united by specific goals, or the society as a whole.…”
Section: Introductionmentioning
confidence: 99%
“…Peak Signal-to-Noise Ratio (PSNR) is used to measure image distortion due to embedding and it is measured in decibels (dB) [9,10]. PSNR=10 log 10 (C2max /MSE) …..…………… (2) Where, Cmax holds the maximum value in the image that is 255 and MSE is the mean square error which is determined by equation (1).…”
Section: ∑ ∑mentioning
confidence: 99%
“…This requires a measure of stego-image quality, commonly used measures are Mean Square Error (MSE), and Peak Signal-to-Noise Ratio (PSNR). Mean Square Error (MSE) is used to quantify the difference between the initial (cover) and the distorted or noisy (Stego) image [8,9].…”
Section: The Way In Which the Plain Text Is Processedmentioning
confidence: 99%