2013
DOI: 10.3923/rjit.2013.329.340
|View full text |Cite
|
Sign up to set email alerts
|

Rubik's Cube: A Way for Random Image Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…STEP [1] Divide the cover image in to small blocks STEP [2] Construct the difference image STEP [3] Find the peak point using histogram STEP [4] Modify the image using modification principle STEP [5] Embed the data in the modified image STEP [6] Marked image is constructed using inverse transformation B. Message extraction and reconstruction STEP [1] Divide the marked image in to blocks STEP [2] Calculate the difference image STEP [3] Extract the message and remove the embedded bits from the marked pixels STEP [4] Shift the pixel values to reconstruct the original difference image STEP [5] By applying inverse transformation, original image has been obtained C. Inverse S order STEP [1] Cover image is scanned using inverse S order fashion STEP [2] Pixel differences between the adjacent pixels are calculated.…”
Section: A Block Based Embeddingmentioning
confidence: 99%
See 3 more Smart Citations
“…STEP [1] Divide the cover image in to small blocks STEP [2] Construct the difference image STEP [3] Find the peak point using histogram STEP [4] Modify the image using modification principle STEP [5] Embed the data in the modified image STEP [6] Marked image is constructed using inverse transformation B. Message extraction and reconstruction STEP [1] Divide the marked image in to blocks STEP [2] Calculate the difference image STEP [3] Extract the message and remove the embedded bits from the marked pixels STEP [4] Shift the pixel values to reconstruct the original difference image STEP [5] By applying inverse transformation, original image has been obtained C. Inverse S order STEP [1] Cover image is scanned using inverse S order fashion STEP [2] Pixel differences between the adjacent pixels are calculated.…”
Section: A Block Based Embeddingmentioning
confidence: 99%
“…Message extraction and reconstruction STEP [1] Divide the marked image in to blocks STEP [2] Calculate the difference image STEP [3] Extract the message and remove the embedded bits from the marked pixels STEP [4] Shift the pixel values to reconstruct the original difference image STEP [5] By applying inverse transformation, original image has been obtained C. Inverse S order STEP [1] Cover image is scanned using inverse S order fashion STEP [2] Pixel differences between the adjacent pixels are calculated. STEP [3] Find the peak point STEP [4] Then embed the message at the peak points STEP [5] Then the marked image is constructed STEP [6] Message extraction and reconstruction STEP [7] Marked image is scanned using inverse S order 978-1-4673-6680-9/16/$31.00 ©2016 IEEE STEP [8] Using the peak point values, extract the message STEP [9] Reconstruct the original image…”
Section: A Block Based Embeddingmentioning
confidence: 99%
See 2 more Smart Citations
“…In this modern world, digital communication has wide range of applications for information security which could be classified as Steganography [5][6][7][8][9][10][11][12][13][14][15][16][17], Watermarking [2,6], Spread Spectrum [18][19][20][21][22] and Encryption [23][24][25][26][27][28][29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%