期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Elevating Image Steganography:A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities
1
作者 Muhammad Zaman Ali Omer Riaz +3 位作者 Hafiz Muhammad Hasnain Waqas Sharif Tenvir Ali Gyu Sang Choi 《Computers, Materials & Continua》 SCIE EI 2024年第5期2923-2943,共21页
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encr... In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure communications.Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution.In this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)substitution.The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three bits.The proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment capacity.The achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 dB.These findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity. 展开更多
关键词 STEGANOGRAPHY most significant bit(MSB) least significant bit(LSB) peak signal-to-noise ratio(PSNR)
下载PDF
An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images
2
作者 R.Bala Krishnan D.Yuvaraj +4 位作者 P.Suthanthira Devi Varghese S.Chooralil N.Rajesh Kumar B.Karthikeyan G.Manikandan 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1563-1576,共14页
With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional ... With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission.Both of the techniques mentioned above aid in the confidentiality of feature content.The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red,Green,and Blue.The private Content originated from a medical client and was forwarded to a medical practitioner on the server end through the internet.The K-Means clustering principle uses the contouring approach to frame the pixel clusters on the image layers.The content embodiment procedure is performed on the selected pixel groups of all layers of the image using the Least Significant Bit(LSB)substitution technique to build the secret Content embedded image known as the stego image,which is subsequently transmitted across the internet medium to the server end.The experimental results are computed using the inputs from“Open-Access Medical Image Repositories(aylward.org)”and demonstrate the scheme’s impudence as the Content concealing procedure progresses. 展开更多
关键词 CONTOURING secret content embodiment least significant bit embedding medical data preservation secret content congregation pixel clustering
下载PDF
A Novel Approach of Image Steganography for Secure 被引量:3
3
作者 Shahid Rahman Fahad Masood +5 位作者 Wajid Ullah Khan Niamat Ullah Fazal Qudus Khan Georgios Tsaramirsis Sadeeq Jan Majid Ashraf 《Computers, Materials & Continua》 SCIE EI 2020年第7期31-61,共31页
Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction data.Securing the data during transmission is of utmost importance these days.T... Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction data.Securing the data during transmission is of utmost importance these days.The confidentiality,integrity,and availability of the data are at risk because of the emerging technologies and complexity in software applications,and therefore,there is a need to secure such systems and data.There are various methodologies to deal with security issues when utilizing an open system like the Internet.This research proposes a new technique in steganography within RGB shading space to achieve enhanced security compared with existing systems.We evaluate our approach with the help of diverse image quality evaluation techniques including MSE(Mean Square Error),RMSE(Root Mean Square Error),PSNR(Peak Signal-to-Noise Ratio),MAE(Mean Absolute Error),NCC(Normalized Cross-Correlation)and SSIM(Structural Similarity Index).Our experimental results demonstrate improved strength,intangibility,and security when contrasted with existing techniques and vindicate the effectiveness of this exploration work.The proposed approach achieved a 3.6701%average higher score for PSNR Correlation than the next best existing approach.Moreover,in PSNR with a variable amount of cipher embedded in the same images of the same dimensions,the proposed approach attained a 5.22%better score.Embedding the same size of cipher in images of different size resulted a 3.56%better score. 展开更多
关键词 Image steganography least significant bits MLEA and RGB color space
下载PDF
Block-Based Adaptive Image Steganography Using LSB Matching Revisited 被引量:2
4
作者 Wei Huang Yao Zhao Rong-Rong Ni 《Journal of Electronic Science and Technology》 CAS 2011年第4期291-296,共6页
Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate ... Recently, an edge adaptive image stegano- graphic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the presence of a secret message even in a low embedding rate. To enhance the security, a modified scheme is proposed in this paper, which can defeat the above-mentioned analysis and keep the visual quality better than EA-LSBMR in higher embedding rates. Experimental results using a latest universal steganalysis method have demonstrated the proposed method's good performance. 展开更多
关键词 Index Terms---Block-based steganography least significant bit matching revisited pixel-pairs differences histogram steganalysis.
下载PDF
Double-Layer Data Embedding Scheme Based on Three-Pixel Differences 被引量:1
5
作者 Chiao-Chih Huang Chi-Shiang Chan 《Journal of Electronic Science and Technology》 CAS 2011年第4期297-300,共4页
Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but ... Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better biding capacity with high ability of resisting security analysis. 展开更多
关键词 Hiding capacity least significant bit replacement security analysis STEGANOGRAPHY visual quality.
下载PDF
Blind Detection of LSB Steganography in Grayscale Images
6
作者 胡玲娜 蒋铃鸽 何晨 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期239-242,共4页
There are many detectors for the least significant bit(LSB)steganography which is broadly used in hiding information in the digital images.The length of the hidden information is one of the most important parameters i... There are many detectors for the least significant bit(LSB)steganography which is broadly used in hiding information in the digital images.The length of the hidden information is one of the most important parameters in detecting steganographic information.Using 2-D gradient of a pixel and the distance between variables the proposed method gives the length of hidden information in natural grayscale images without original image.Extensive experimental results show good performance even at low embedding rate compared with other methods.Furthermore,the proposed method also works well disregarding the status of the embedded information. 展开更多
关键词 least significant bit (LSB) natural grayscale images 2-D gradient distance of variables
下载PDF
A low power mixed signal DC offset calibration circuit for direct conversion receiver applications
7
作者 杨利君 袁芳 +2 位作者 龚正 石寅 陈治明 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2011年第12期134-138,共5页
A low power mixed signal DC offset calibration (DCOC) circuit for direct conversion receiver applica- tions is designed. The proposed DCOC circuit features low power consumption, fast settling time and a small die a... A low power mixed signal DC offset calibration (DCOC) circuit for direct conversion receiver applica- tions is designed. The proposed DCOC circuit features low power consumption, fast settling time and a small die area by avoiding the trade-off between loop response time and the high pass frequency of the DCOC servo loop in conventional analog DCOC systems. By applying the proposed DC offset correction circuitry, the output residue DC offset voltages are reduced to less than 38 mV and the DCOC loop settling time is less than 100 μs. The DCOC chip is fabricated in a standard 0.13μm CMOS technology and drains only 196 μA from a 1.2-V power supply with its chip area of only 0.372 ×0.419 mm^2. 展开更多
关键词 mixed signal DC offset calibration analog to digital converter digital control logic unit digital toanalog converter least significant bit
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部