information hiding capacity
Recently Published Documents


TOTAL DOCUMENTS

10
(FIVE YEARS 2)

H-INDEX

2
(FIVE YEARS 0)

2021 ◽  
pp. 3220-3227
Author(s):  
Sarab M. Hameed ◽  
Zuhair Hussein Ali ◽  
Ghadah K. AL-Khafaji ◽  
Safa Ahmed

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of the image band and pixel coordination is adopted, using the 3D map that produces irregular outputs for embedding a secret message randomly in the least significant bit (LSB) of the cover image. This increases the complexity encountered by the attackers. The performance of the proposed method was evaluated and the results reveal that the proposed method provides a high level of security through defeating various attacks, such as statistical attacks, with no detectable distortion in the stego-image. Comparison results ensure that the proposed method surpasses other existing steganographic methods regarding the Mean Square Error (MSE) and Peak Signal-to-Noise Ratio(PSNR).


2020 ◽  
Vol 104 (sp1) ◽  
Author(s):  
Zheng Ma ◽  
Yan Ma ◽  
Xiaohong Huang ◽  
Manjun Zhang ◽  
Yanxiao Liu ◽  
...  

2013 ◽  
Vol 850-851 ◽  
pp. 483-486
Author(s):  
Xiao Feng Wang

This paper designs and implements an information hiding algorithms by using the equivalent characteristics of attributes and sub-elements in the XML document. Experimental results show that the algorithm has large information hiding capacity, better hiding features and robustness.


2013 ◽  
Vol 798-799 ◽  
pp. 423-426
Author(s):  
Xiao Feng Wang

Through the analysis of the hypertext markup, proposed and implemented several new methods of text information hiding. The concealment of these methods is better, Comprehensive utilization of these methods can obtain large information hiding capacity, better concealed. And they have better robustness for traditional attack.


Author(s):  
Kitahiro Kaneda ◽  
Keiichi Iwamura

Digital watermarks provide the capability to insert additional information onto various media such as still images, movies, and audios, by utilizing features of the media content. Several techniques that use content features such as text or images have already been proposed for printed documents. The authors propose two new techniques using a single dot pattern and an Artificial Fiber (AF) pattern in order to address the disadvantages of conventional information hiding technologies for paper media. In this chapter, the authors describe each scheme’s characteristics, and how to improve its robustness. As a result, they have attained greater than 80% extraction rate with an information hiding capacity of 91 Kbits in the case of the single dot pattern, and a 100% extraction rate with color characters as the foreground in the case of using artificial fiber patterns.


2008 ◽  
Vol 178 (14) ◽  
pp. 2950-2959 ◽  
Author(s):  
Fan Zhang ◽  
Zhigeng Pan ◽  
Kui Cao ◽  
Fengbin Zheng ◽  
Fangming Wu

2008 ◽  
pp. 3282-3308
Author(s):  
Ching-Yung Lin

Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital signature, the theoretical bound of information hiding capacity of images, an introduction of the self-authentication-and-recovery image (SARI) system, and a novel technique for image/video authentication in the semantic level. This chapter provides an overview of these image authentication issues.


2005 ◽  
pp. 173-206
Author(s):  
Ching-Yung Lin

Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital signature, the theoretical bound of information hiding capacity of images, an introduction of the self-authentication-and-recovery image (SARI) system, and a novel technique for image/video authentication in the semantic level. This chapter provides an overview of these image authentication issues.


Sign in / Sign up

Export Citation Format

Share Document