2018
DOI: 10.11591/ijeecs.v12.i1.pp233-238
|View full text |Cite
|
Sign up to set email alerts
|

The Embedding Performance of StegSVM Model in Image Steganography

Abstract: This paper focuses on one of the areas of information hiding which is image steganography. It proposes the StegSVM model as an embedding technique in steganography that has exploited human visual system through Shifted LSB that shows an expected performance. The performance of this technique evaluation is based on imperceptibility and robustness of the technique compared to the other previous models in image steganography doamin. Thus, the result shows that the proposed StegSVM model is promising. For further … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…As mentioned earlier the steganalyser is to exploit the vulnerable fields of image header to identify the tool. The fields that may lead to identification of the tools are detailed for each format [25]- [29].…”
Section: Fields Considered In Each Image Formatmentioning
confidence: 99%
“…As mentioned earlier the steganalyser is to exploit the vulnerable fields of image header to identify the tool. The fields that may lead to identification of the tools are detailed for each format [25]- [29].…”
Section: Fields Considered In Each Image Formatmentioning
confidence: 99%
“…This password is generated based on system date and time at a random basis and then sent as confidential text [1] into a cover image using steganography [2,3,4]. Embedding [5] and extraction techniques are also applied using an innovative approach which assures adequate space saving and lesser modification in a stego image  ISSN:2089-3272 IJEEI, Vol. 8, No.…”
Section: The Proposed Solutionmentioning
confidence: 99%
“…THE PROPOSED METHOD 2.1. Generation of CAPTCHA a) Generate a random number [13] between 8 and 16. Let it be n. (We consider that our CAPTCHA would be minimum of 8 characters and maximum of 16 characters) b) Initialize a string str as str=" " c) Perform following task for n times d) Generate random numbers between 97 and 122 (ASCII of a to z) and place it into the variable char.…”
Section: The Proposed Solutionmentioning
confidence: 99%