Modern Methods in Image Steganography

被引:0
|
作者
Banoci, Vladimir [1 ]
Bugar, Gabriel [1 ]
Levicky, Dusan [1 ]
Klenovicova, Zita [1 ]
机构
[1] FEI TU Kosice, Dept Elect & Multimedia Commun, Kosice, Slovakia
关键词
steganography; steganography techniques; image quality metrics; HVS; STEGANALYSIS; WATERMARKING;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In last decade the information communication is marked by countless restrictions of state authorities to monitor and restrain communication of the individuals or groups. Due to retention of privacy protection there are naturally intentions to protect and hide this inapproachable type of communication. However, those intention could have other than illegal notion i. e. bank-houses and business related institutions trying to hide their communication by reason of the security related issues. The steganography as art of science, which is dedicated to the methods of hiding secret communication against a background of the harmless - cover communication. This paper deals about the steganography and also emerging problems of hidden communication in the cover information media as imperceptibility and capacity of designed steganographic channel, and after all finding suitable embedding techniques to meet conditions claimed upon steganography.
引用
收藏
页码:119 / 122
页数:4
相关论文
共 50 条
  • [1] An evaluation of image based steganography methods
    Bailey K.
    Curran K.
    [J]. Multimedia Tools and Applications, 2006, 30 (1) : 55 - 88
  • [2] Delving into the Methods of Coverless Image Steganography
    Ng, Koi Yee
    Ong, Simying
    Wong, KokSheik
    [J]. 2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1763 - 1772
  • [3] Analysis of Data Hiding Methods in Image Steganography
    Akshay, K. C.
    Muniyal, Balachandra
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2023 - 2027
  • [4] Survey on Steganography Methods (Text, Image, Audio, Video, Protocol and Network Steganography)
    PrashantJohri
    Mishra, Amba
    Das, Sanjoy
    Kumar, Arun
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2906 - 2909
  • [5] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [6] Review on image steganography using different LSB methods
    Sharma, Vijay Kumar
    Soni, Bhanu Pratap
    Janu, Neha
    Aziz, Sadaf
    Shekhawat, Deepika
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1319 - 1329
  • [7] Testing Methods for the Efficiency of Modern Steganography Solutions for Mobile Platforms
    Bucerzan, Dominic
    Ratiu, Crina
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 30 - 36
  • [8] A New Image Steganography Based on Denoising Methods in Wavelet Domain
    Motamedi, Hoda
    Jafari, Ayyoob
    [J]. 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 18 - 25
  • [9] Image Steganography using Combined Nearest and Farthest Neighbors Methods
    Sharmin, Farhana
    Khan, Muhammad Ibrahim
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 213 - 219
  • [10] Image steganography using combined nearest and farthest neighbors methods
    Sharmin, Farhana
    Khan, Muhammad Ibrahim
    [J]. International Journal of Advanced Computer Science and Applications, 2019, 10 (11): : 213 - 219