216 research outputs found

    LSB steganography with improved embedding efficiency and undetectability

    Get PDF

    Edge-based image steganography

    Get PDF

    Corners-based Image Information Hiding Method

    Get PDF
    The huge explosion of information over World Wide Web forces us to use information security methods to keep it away fromintruders. One of these security methods is information hiding method. Advantage of this method over other security methods is hidingexistence of data using carrier to hold this data embedding inside it. Image-based information hiding represents one of widely usedhiding methods due to the image capability of holding large amount of data as well as its resistance to detectable distortion. In lastdecades, statistical methods (types of stego-analysis methods) are used to detect existing of hidden data. Therefore, areas that have colorvariation (edges area) are used to hide data instead of smooth areas. In this paper, Corners points are proposed to hide data instead ofedges, this to avoid statistical attacks that are used to expose hidden message. Additionally, this paper proposes clearing least significantbit (CLSB) method to retrieve data from stego-image without sending pixels' map; this will increase security of the proposed cornerbasedhiding method. Experimental results show that the proposed method is robust against statistical attacks compared with edge-and sequential-based hiding methods. SVM classifier also confirms the outperformance of the proposed method over the previous methods by using Corel-1000image dataset

    Review of steganalysis of digital images

    Get PDF
    Steganography is the science and art of embedding hidden messages into cover multimedia such as text, image, audio and video. Steganalysis is the counterpart of steganography, which wants to identify if there is data hidden inside a digital medium. In this study, some specific steganographic schemes such as HUGO and LSB are studied and the steganalytic schemes developed to steganalyze the hidden message are studied. Furthermore, some new approaches such as deep learning and game theory, which have seldom been utilized in steganalysis before, are studied. In the rest of thesis study some steganalytic schemes using textural features including the LDP and LTP have been implemented
    • …
    corecore