49 research outputs found
Analisis Penerapan Metode Lossy pada Kompresi Citra Steganografi
The internet has become a very important part of communication development in the world. Exchange of information over the internet has many advantages compared to other communication media, especially in terms of speed. But information sent via the internet, security cannot be accounted for. Tapping on confidential information, very often occurs in this communication media. Channels used by the internet are generally not safe channels.
By using the lossy compression method, compression can only be applied to images that have similarities to themselves (self similiarity) so that the size of the image gets smaller and saves storage space and accelerates the sending of the image using internet media
Conditional Entrench Spatial Domain Steganography
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR
A New Information Hiding Method Based on Improved BPCS Steganography
Bit-plane complexity segmentation (BPCS) steganography is advantageous in its capacity and imperceptibility. The important step of BPCS steganography is how to locate noisy regions in a cover image exactly. The regular method, black-and-white border complexity, is a simple and easy way, but it is not always useful, especially for periodical patterns. Run-length irregularity and border noisiness are introduced in this paper to work out this problem. Canonical Cray coding (CGC) is also used to replace pure binary coding (PBC), because CGC makes use of characteristic of human vision system. Conjugation operation is applied to convert simple blocks into complex ones. In order to contradict BPCS steganalysis, improved BPCS steganography algorithm adopted different bit-planes with different complexity. The higher the bit-plane is, the smaller the complexity is. It is proven that the improved BPCS steganography is superior to BPCS steganography by experiment
StegNet: Mega Image Steganography Capacity with Deep Convolutional Network
Traditional image steganography often leans interests towards safely
embedding hidden information into cover images with payload capacity almost
neglected. This paper combines recent deep convolutional neural network methods
with image-into-image steganography. It successfully hides the same size images
with a decoding rate of 98.2% or bpp (bits per pixel) of 23.57 by changing only
0.76% of the cover image on average. Our method directly learns end-to-end
mappings between the cover image and the embedded image and between the hidden
image and the decoded image. We~further show that our embedded image, while
with mega payload capacity, is still robust to statistical analysis.Comment: https://github.com/adamcavendish/StegNet-Mega-Image-Steganography-Capacity-with-Deep-Convolutional-Networ
Hiding in Plain Sight: Scrubbing Unwanted Information
Steganography is a technique used to hide encrypted messages within multimedia files. This technique was recently reported to have been used by Osama Bin Laden to communicate with terrorist cells within the United States, and, thus, prevention of the transmission of steganographic content is of great interest to those interested in information security. Methods of steganalysis have been developed that attempt to detect files that contain steganographic content. However, authors of these methods admit that they are not viable for production or have been shown to be defeated by newer advances in steganography. This design science research illustrates an innovation in which algorithms neutralize any hidden messages without significantly detracting from the underlying integrity of the multimedia files and without the need for prior detection of steganographic content
IMAGE STEGANOGRAPHY TAILORED TO OBJECTS CONTOURS
This article proposes a steganography method that uses all three components of an image in the RGB color space to store secret data. The order in which the image pixels are processed is not given by their position within the image, but by their visual significance. In order to ensure the greatest possible embedding capacity, the image container is traversed in several passes, each expanding its capacity
Analisis Penerapan Metode Lossy Pada Kompresi Citra Steganografi
The internet has become a very important part of communication development in the world. Exchange of information over the internet has many advantages compared to other communication media, especially in terms of speed. But information sent via the internet, security cannot be accounted for. Tapping on confidential information, very often occurs in this communication media. Channels used by the internet are generally not safe channels.
By using the lossy compression method, compression can only be applied to images that have similarities to themselves (self similiarity) so that the size of the image gets smaller and saves storage space and accelerates the sending of the image using internet media