scholarly journals A High Quality Steganography Method with Twenty Five-Pixel Value Differencing

2019 ◽  
Vol 15 (10) ◽  
pp. 1538-1545
Author(s):  
Rojali ◽  
Ford Lumban Gaol ◽  
Edi Abdurahman ◽  
Benfano Soewito
2012 ◽  
Vol 20 (2) ◽  
Author(s):  
C. Weng ◽  
H. Tso ◽  
S. Wang

AbstractIn this paper, we propose a stenography scheme based on predictive differencing to embed data in a grey-image. In order to promote the embedding capacity of pixel-value differencing (PVD), we use differencing between a predictive value and an input pixel as the predictive differencing to embed the message where a predictive value is calculated by using various predictors. If the predictive differencing is large, then it means that the input pixel is located in the edge area and, thus, has a larger embedding capacity than the pixel in a smooth area. The experimental result shows that our proposed scheme is capable of providing greater embedding capacity and high quality of stego-images then previous works. Furthermore, we have also applied various predictors to evaluate our proposed scheme.


2008 ◽  
Vol 81 (1) ◽  
pp. 150-158 ◽  
Author(s):  
Chung-Ming Wang ◽  
Nan-I Wu ◽  
Chwei-Shyong Tsai ◽  
Min-Shiang Hwang

Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


2011 ◽  
Vol 84 (4) ◽  
pp. 669-678 ◽  
Author(s):  
Cheng-Hsing Yang ◽  
Chi-Yao Weng ◽  
Hao-Kuan Tso ◽  
Shiuh-Jeng Wang

Sign in / Sign up

Export Citation Format

Share Document