2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2017
DOI: 10.1109/cvprw.2017.183
|View full text |Cite
|
Sign up to set email alerts
|

Information Hiding in RGB Images Using an Improved Matrix Pattern Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
19
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 29 publications
0
19
0
Order By: Relevance
“…1. This work supports all 256 ASCII characters, while the earlier MP works [49,51,54,83] supported only 49 and 95 English keyboard characters. Thus, any digital media can be hidden as a message like a cryptographically encoded message.…”
Section: Introductionmentioning
confidence: 94%
“…1. This work supports all 256 ASCII characters, while the earlier MP works [49,51,54,83] supported only 49 and 95 English keyboard characters. Thus, any digital media can be hidden as a message like a cryptographically encoded message.…”
Section: Introductionmentioning
confidence: 94%
“…The authors also tested their scheme against many frequency and spatial domain attacks such as: RS, Sample pair, X2 and DCT based attacks, and were able to prove its resiliency against malicious efforts. The authors of [18] also propose a steganography technique based on matrix patterns. The RGB image is first divided into square sized blocks then 95 matrix patterns are automatically formed using the 4th and 5th bit layers of the green layer of each block.…”
Section: Introductionmentioning
confidence: 99%
“…The scheme was shown to have high resistance against steganalysis attacks including Regular Singular, Sample Pair, and PVD based attacks and has higher capacity than [17]. In [19], a combination of two steganography techniques is proposed, matrix pattern steganography such as in [17] and [18], and standard LSB substitution. The matrix pattern technique first divides the RGB coverimage into a number of non-overlapping blocks.…”
Section: Introductionmentioning
confidence: 99%
“…Biometric technology, which is widely spread due to its high accuracy and user friendliness, is currently employed for recognizing individuals via measurable physiological or behavioural properties [8]. To the best of our knowledge, the physiological properties include fingerprint [9], iris [10], and face [11], while the behavioural properties include tread [12], signature [13], and voice [14]. To this end, by transferring the biometric properties into electric signals, we are thus able to get insight into the system of using biometrics to describe individuals [15].…”
Section: Introductionmentioning
confidence: 99%