scholarly journals Steganographic Scheme based on Message-Cover matching

Author(s):  
Youssef Taouil ◽  
El Bachir Ameur

Steganography is one of the techniques that enter into the field of information   security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the Faber-Schauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another pair based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.

Author(s):  
Kokila B. Padeppagol ◽  
Sandhya Rani M H

Image steganography is an art of hiding images secretly within another image. There are several ways of performing image steganography; one among them is the spatial approach.The most popular spatial domain approach of image steganography is the Least Significant Bit (LSB) method, which hides the secret image pixel information in the LSB of the cover image pixel information. In this paper a LSB based steganography approach is used to design hardware architecture for the Image steganography. The Discrete Wavelet Transform (DWT) is used here to transform the cover image into higher and lower wavelet coefficients and use these coefficients in hiding the secret image. the design also includes encryption of secret image data, to provide a higher level of security to the secret image. The steganography system involving the stegno module and a decode module is designed here. The design was simulated, synthesized and implemented on Artix -7 FPGA. The operation hiding and retrieving images was successfully verified through simulations.


2021 ◽  
Vol 16 ◽  
pp. 110-120
Author(s):  
Saugata Dutta ◽  
Kavita Saini

Steganography is a technology which is utilized in securing information through hiding data over another data which can be stored or passed over public network without a clue that secret data is hidden in the cover medium. This article focus on securing and hiding the data through transform domain techniques used in Image, Audio and Video steganography. The review study throws light on the algorithm and properties of transform domain techniques and its benefits to utilize in securing data. Parameters such as imperceptibility, capacity and robustness are evaluated for discrete cosine transform (DCT) and discrete wavelet transform (DWT).


In this paper, we present a model for data hiding using modified least Significant Bit and DWT concept to further improve the ability to embed as a picture good (EC).From the begin, each high-quality pixel produces 4 new pixels. The puzzle facts is concealed in all the four conveyed pixels. via then the pixels are fixed to improve the concept of the stego-pics. There are four separate stego-pictures crafted from the four unmistakable revised pixels. each stego-photo disguises one piece for every pixel. For Stego-photos, the typical peak signal-to-noise ratios (PSNR) the proposed procedure successfully withstand against RS-stego examination


Informatica ◽  
2013 ◽  
Vol 24 (4) ◽  
pp. 657-675
Author(s):  
Jonas Valantinas ◽  
Deividas Kančelkis ◽  
Rokas Valantinas ◽  
Gintarė Viščiūtė

Sign in / Sign up

Export Citation Format

Share Document