2021
DOI: 10.3390/e23030273
|View full text |Cite
|
Sign up to set email alerts
|

Eigenfaces-Based Steganography

Abstract: In this paper we propose a novel transform domain steganography technique—hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details). The study found that when the method was trained on large enough data sets, image quality was nearly unaffected by modification of some linear combination coefficients used a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Data may be stored in the cloud and cloud computing used online, but the issue with data security still exists [11]. The two-way technique provides security information in picture format [12]. The security of image-based data stored in the cloud is increased by integrating the two techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Data may be stored in the cloud and cloud computing used online, but the issue with data security still exists [11]. The two-way technique provides security information in picture format [12]. The security of image-based data stored in the cloud is increased by integrating the two techniques.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To make this 2d to 1d conversion we store each row of the image one by another in a single row vector. In order to calculate PCA-based embedding (we will call it also “basic PCA”) of image we can adapt eigenfaces-based image representation similar to one used in [ 110 ]. In order to do so we need to create a matrix that contains all observations: where X has dimensions.…”
Section: Materials and Methodsmentioning
confidence: 99%
“…These techniques use as embedding region singular vectors, singular values or combinations of them [ 26 , 27 , 28 , 29 ]. There are also steganographic methods that use principal component analysis to facial images, which is called eigenfaces [ 30 ]. These algorithms generally include encryption for additional security, the examples may be found among image [ 31 ] and video steganography [ 32 ].…”
Section: Introductionmentioning
confidence: 99%