期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Increasing Distance Increasing Bits Substitution (IDIBS) Algorithm for Implementation of VTVB Steganography
1
作者 Sahib Khan Arslan Arif +1 位作者 Syed Tahir Hussain Rizvi Nasir Ahmad 《Computer Modeling in Engineering & Sciences》 SCIE EI 2018年第10期1-16,共16页
Cryptography and steganography are two important and related fields of information security.But,steganography is slightly different in the sense that it hides the existence of secret information from unauthorized user... Cryptography and steganography are two important and related fields of information security.But,steganography is slightly different in the sense that it hides the existence of secret information from unauthorized users.It is one of the most appealing research domains,have applications like copyright protection,data integrity protection and manipulation detection.Several steganography techniques have been proposed in literature.But,in this work a new information hiding algorithm is presented.The proposed technique de-correlates frequency components of cover image using discrete cosine transform and uses the least significant bits of frequency components for hiding secret information.The tech-nique hides variable number of bits of secret message in different frequency components.Therefore,it hides different amount of secret information in different regions of cover im-age and results in enhancement of security.The algorithm has the flexibility to change the hiding capacity and quality of final stego image.It has been observed from experimental results that a hiding a capacity from 3%to 43%can be achieved with significantly good quality of 41 dB to 37 dB in term of peak signal to noise ratio.The successful recovery of the hidden information need the pattern,called stego key,in which is used in hiding process.The algorithm provides twofold security;hiding keeps the existence of hidden information secret and the large key size makes the retrieval of hidden information difficult for intruders. 展开更多
关键词 VTVB STEGANOGRAPHY image processing information SECURITY data hiding
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部