2010 International Conference on Information and Emerging Technologies 2010
DOI: 10.1109/iciet.2010.5625723
|View full text |Cite
|
Sign up to set email alerts
|

Pixel intensity based high capacity data embedding method

Abstract: Steganography is the science of hiding a message signal to host signal, without any distortion in the hosted signal. Using steganography, information can be hidden in hosted carrier such as images, videos, sounds files, text files, and data transmission. In image steganography, to improve the capacity of hidden data into hosted image without causing any statistically significant modification has a major concern. Many novel data hiding method based on Least Significant Bits (LSB) and Pixel Value Differencing (P… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The number of LSBs to embed depends on the intensity pixel values as given in Table 1. Later on, Mehdi Hussain et al [11] improved the MKA algorithm with respect to two major aspects:…”
Section: Modified Kekre Algorithmmentioning
confidence: 99%
“…The number of LSBs to embed depends on the intensity pixel values as given in Table 1. Later on, Mehdi Hussain et al [11] improved the MKA algorithm with respect to two major aspects:…”
Section: Modified Kekre Algorithmmentioning
confidence: 99%
“…Various steganalysis techniques are also available to detect steganography [5]. This paper presents a modified version of the scheme proposed by Kekre [6] and Hussain [7] based on variable least significant bits data embedding along with the cryptography applied on the text message rather than just applying the 8 bit secret key XOR method. Other features of the proposed work are that it successfully resists the stastical attacks like histogram analysis, chi-square analysis and RS analysis.…”
Section: Introductionmentioning
confidence: 99%
“…A steganography system consists of the following components [3,4]: Cover Image: It is an image that secures the secret message, and is used as a cover for transmitting the message.…”
Section: Introductionmentioning
confidence: 99%