Proceedings of the International Conference and Workshop on Emerging Trends in Technology 2010
DOI: 10.1145/1741906.1741921
|View full text |Cite
|
Sign up to set email alerts
|

Performance comparison of DCT and Walsh transform for steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The results indicate the feasibility of the proposed approach although the computational requirements are significant. The results correspond with parts of [19], [20] and are also somewhat inferior to those achieved using hybrid wavelet transforms on images but illustrate the feasibility of the application of wavelets for video steganography.…”
Section: Discussionmentioning
confidence: 60%
“…The results indicate the feasibility of the proposed approach although the computational requirements are significant. The results correspond with parts of [19], [20] and are also somewhat inferior to those achieved using hybrid wavelet transforms on images but illustrate the feasibility of the application of wavelets for video steganography.…”
Section: Discussionmentioning
confidence: 60%
“…The first type algorithms pay more attention to embedding capacity, such as those proposed by [11][12][13], the second type algorithms are absorbed in robustness, such as those proposed by [15][16][17][18]22], and the third type algorithms emphasize a compromise of capacity, robustness, and invisibility, such as those in [19][20][21]. It cannot say that the capacity of our proposed algorithm is as good as the first type and the robustness is as good as the second type because it belongs to the third type.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…The hiding algorithm based on LSB proposed by [12,14] that based on MSB in [13] and that based on de-clustering in [11], all have large capacity, but the robustness is not satisfactory. The hiding algorithm based on DWT in [15] and those based on discrete cosine transform (DCT) in [16][17][18] have good robustness and good invisibility; however, the data hiding capacity is very low because it is not originally designed for this purpose of large amount. It has become a hot spot on how to balance the invisibility, robustness, and capacity of the hiding algorithm.…”
Section: Motivationmentioning
confidence: 99%
“…So they can be "mixed up" using actions of reversing multiplying, summing which is also called as convolution. These wavelets are becoming very useful for huge number of applications like fingerprint application, palm print application, Steganography [2], Iris recognition. The wavelets exploited largely and also grow to be important in the fields of image compression, analyses of Electrocardiogram (ECG), Deoxyribonucleic Acid (DNA), Face and speech recognition, computer graphics.…”
Section: Introductionmentioning
confidence: 99%