The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A number of approaches have been developed for image steganography till date but none have used quadtree partition scheme. The quadtree partition is used to divide the image on the basis of variations among the pixel values and therefore we can identify the fine grained and coarse grained areas inside the image. It is very much comfortable and effective to hide something in the roadside scrub rather...
In this paper a secret message/image transmission technique has been proposed through (2, 2) visual cryptographic shares which are covered by meaningful images so that a potential eavesdropper won't know there's a message to be read. A binary image is taken as cover image and authenticating message/image has been fabricated into it through a hash function where two bits in each pixel within four bits...
In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. Cryptography involves converting a message text into an unreadable cipher. On the other hand,...
Steganography plays an important role in the field of information hiding. It is used in wide variety of applications such as internet security, authentication, copyright protection and information assurance etc. In Discrete Wavelet Transform (DWT) based steganography approaches the wavelet coefficients of the cover image are modified to embed the secret message. DWT based algorithm for image data...
In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and image steganography. We encrypt the secret message by using a new cipher which is extended from Hill cipher. Then the cipher text of the secret message is embedded into the carrier image in 6th, 7th and 8th bit locations of the darkest and brightest pixels. Here 8th bit means...
In the present work, an effort has been made to propose and implement a new steganographic technique for images by modifying existing algorithms. This technique uses LSB steganography as the basis and randomly disperses the secret message over the entire image to ensure that the secret message cannot be obtained easily from the image. Detailed visual and statistical analysis of the algorithm reveals...
Recent years have seen more interest from researchers in image encryption using chaotic signals. A new method was proposed for image steganography in this article in which two chaotic signals for specifying the location of the different parts of the message in the picture. An 80-bit key was used to reach the preliminary measures of the two chaotic signals. One of the advantages of this method is its...
Recent years have seen more interest from researchers in image encryption using chaotic signals. A new method was proposed for image steganography in this article in which two chaotic signals for specifying the location of the different parts of the message in the picture. An 80-bit key was used to reach the preliminary measures of the two chaotic signals. One of the advantages of this method is its...
This paper presents a novel image steganographic method that utilizes support vector regression (SVR) to predict the embedded pixel value such that secret data is also embedded into the pixel-value difference between the predicted pixel value and the original pixel value. Due to the significant learning ability in the correlations of training samples by support vector regression, the trained SVR function...
After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (multimedia...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.