Digital Image Steganography using Dithering Technique

被引:6
|
作者
Biswas, D. [1 ]
Biswas, S. [2 ]
Majumder, A. [1 ]
Sarkar, D. [1 ]
Sinha, D. [1 ]
Chowdhury, A. [1 ]
Das, S. K. [1 ]
机构
[1] Acad Technol, Hooghly 712121, W Bengal, India
[2] Univ Kalyani, DETS, Kalyani 741235, W Bengal, India
关键词
channelization; dithering; VCS; pixel expansion; pixel compression; restoration;
D O I
10.1016/j.protcy.2012.05.038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography refers to the science of "invisible" communication. Unlike cryptography, where the goal is to secure communications from an eavesdropper, steganographic techniques strive to hide the very presence of the message itself from an observer. The general idea of hiding some information in digital content has a wider class of applications that go beyond steganography. Here we propose a new innovative technique for hiding and then retrieving a secret image. The technique consists of two processes viz. encoding and decoding. Main focus in the encoding phase is to hide the secret RGB colour image in a cover image and get some shares which are to be transmitted to the receiver. In the decoding phase, main focus is to get back the retrieved image back to the original image quality as much as possible from the shares in the received end. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of C3IT
引用
收藏
页码:251 / 255
页数:5
相关论文
共 50 条
  • [21] An efficient and secure technique for image steganography using a hash function
    Nezami, Zahid Iqbal
    Ali, Hamid
    Asif, Muhammad
    Aljuaid, Hanan
    Hamid, Isma
    Ali, Zulfiqar
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [22] Image Steganography and Visible Watermarking using LSB Extraction Technique
    Bhatt, Santhoshi
    Ray, Arghya
    Ghosh, Avishake
    Ray, Ananya
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [23] A Secure Image Steganography Technique Using Integer Wavelet Transform
    Hemalatha, S.
    Renuka, A.
    Acharya, U. Dinesh
    Kamath, Priya R.
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 755 - 758
  • [24] An adaptive image steganography using AMBTC compression and interpolation technique
    Tang, Mingwei
    Zeng, Shenke
    Chen, Xiaoliang
    Hu, Jie
    Du, Yajun
    OPTIK, 2016, 127 (01): : 471 - 477
  • [25] An efficient and secure technique for image steganography using a hash function
    Nezami Z.I.
    Ali H.
    Asif M.
    Aljuaid H.
    Hamid I.
    Ali Z.
    PeerJ Computer Science, 2022, 8
  • [26] A Novel Technique for Image Steganography Using Nonlinear Chaotic Map
    Thenmozhi, S.
    Chandrasekaran, M.
    7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2013), 2013, : 307 - 311
  • [27] An image steganography for colour images using lossless compression technique
    Nithyanandam, P.
    Ravichandran, T.
    Priyadharshini, E.
    Santron, N. M.
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2012, 7 (03) : 194 - 205
  • [28] A Survey on Digital Image Steganography Approaches
    Aqeel, Imra
    Suleman, Muhammad Babar
    INTELLIGENT TECHNOLOGIES AND APPLICATIONS, INTAP 2018, 2019, 932 : 769 - 778
  • [29] Biometric inspired digital image steganography
    Cheddad, Abbas
    Condell, Joan
    Cuffan, Kevin
    Mc Kevitt, Paul
    FIFTEENTH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2008, : 159 - 168
  • [30] A novel scheme for digital image steganography
    Sun, W
    Qi, DX
    CISST '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS, AND TECHNOLOGY, 2004, : 130 - 134