Accès libre

Capacity Enhancement of Messages Concealment in Image and Audio Steganography

À propos de cet article

Citez

Prasad. M. Sitaram, Naganjaneyulu. S, Krishna. CH. Gopi, Nagaraju. C. “A Novel Information Hiding Technique for Security by Using Image Steganography,” Journal of Theoretical and Applied Information Technology (JATIT), vol. 8, no. 6, pp. 35-39, 2005 - 2009. Search in Google Scholar

YANG. Hengfu, SUN. Xingming, SUN. Guang.“A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution,”Radioengineering, vol. 18, no. 4, pp. 509-516, December 2009. Search in Google Scholar

Bender. W, Gruhl. D, Morimoto. N, Aiguo. LU.“Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.10.1147/sj.353.0313 Search in Google Scholar

Jasril, Marzuki. Ismail, Rahmat. Faisal. “Modification Four Bits of Uncompressed Steganography Using Least Significant Bit (LSB) Method”. International Conference of Advance Computer and Information Systems (ICACSIS), pp. 287-292, Universitas Indonesia, Depok (Indonesia), 2013. Search in Google Scholar

YIP. Shu-Kei, AU. Oscar. C, WONG. Hoi-Ming, HO. Chi Wang.“Block-Based Lossless Data Hiding in Delta Domain,” Multimedia and Expo, IEEE International Conference, Toronto, Ontario (Canada), pp. 857-860, 2006.10.1109/ICME.2006.262636 Search in Google Scholar

YANG. Ching-Yu.“Based Upon RBTC and LSB Substitution to Hide Data,” In Proc. First International Conference on Innovative Computing, Information and Control (ICICIC’06), Beijing (China), vol. 1, pp. 476-479, 2006. Search in Google Scholar

CHANG. Chin-Chen, LIN. Chia-Chen, TSENG.Chun-Sen, TAI.Wei-Liang.“Reversible Hiding in DCT-Based Compressed Images,” Information Sciences, vol. 177, no. 13, pp. 2768-2786, 2007. Search in Google Scholar

YANG. You, YU. Ping, XU. Jiangfeng.“An Improved LSB Algorithm Based on MultiTransformation,” In Proc. International Symposium on Information Science and Engineering (ISISE’08). Shanghai (China), vol. 1, pp. 487-49, Dec. 20-22, 2008. Search in Google Scholar

Singh. Pradeep Kumar, Aggrawal. R.K. “Enhancement of LSB Based Steganography for Hiding Image in Audio,” International Journal on Computer Science and Engineering (IJCSE), vol. 02, no.05, pp. 1652-1658, 2010. Search in Google Scholar

THIEN. C. C, LIN. J. C. “A Simple and High-Hiding Capacity Method For Hiding Digit- by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, December 2003. Search in Google Scholar

CHANG. Chin-Chen, LIN. Min-Hui, HU.Yu-Chen.“A Fast and Secure Image Hiding Scheme Based on LSB Substitution,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 399-416, 2002.10.1142/S0218001402001770 Search in Google Scholar

Sathisha. N, et al “Embedding Information in DCT Coefficients Based on Average Covariance”. International Journal of Engineering Science and Technology (IJEST), vol. 3 no. 4, pp. 3184-3194, April 2011. Search in Google Scholar

Hussain. HanizanShanker, et al. “A Novel Hybrid Fuzzy SVM Image Steganographic Model,” International Symposium in Information Technology, vol. 1, pp. 1-6, June 2010.10.1109/ITSIM.2010.5561300 Search in Google Scholar

Jasril, Marzuki. Ismail.“Application Design to Embed Text and File to Uncompressed File with Least Significant Bit”. Journal of Computer Science, vol. 8 no. 2 pp. 137-151, UniveristasPelitaHarapan, Tangerang, (Indonesia), 2012. Search in Google Scholar

Habes. Alkhraisat.“Information Hiding in BMP Image Implementation, Analysis and Evaluation,” Saint Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, Saint Petersburg, Russia, vol. 6, no. 1, pp. 1-10, February 2006. Search in Google Scholar

Saroha. Kriti, Singh. Pradeep Kumar. “A Variant of LSB Steganography for Hiding Images in Audio,” International Journal of Computer Applications, vol. 11, no.6, pp. 12-16, December 2010.10.5120/1588-2128 Search in Google Scholar

Narayana. Sujay, Prasad. Gaurav.“Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions,” Signal& Image Processing: An International Journal (SIPIJ), vol.1, no.2, pp. 60-73, December 2010.10.5121/sipij.2010.1206 Search in Google Scholar

Singh. Saurabh, Agarwal. Gaurav.“Hiding image to video: A new approach of LSB replacement,” International Journal of Engineering Science and Technology, vol. 2, no. 12, pp. 6999-7003, December 2010. Search in Google Scholar

Rahul. Rishi, Sudhir. Batra, Rajkumar. “Mode and Multiple Technique: A New Image Steganography Method for Capacity Enhancement of Message in Image,” International Journal of Computer Applications, vol. 13, no. 4, pp. 10-16, January 2011.10.5120/1770-2432 Search in Google Scholar

Abu-Marie. Walaa, Gutub. Adnan, and Abu-Mansour. Hussein. “Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator”. International Journal of Signal and Image Processing, vol. 1, no. 3, pp. 196-204, 2010. Search in Google Scholar

Eric. Cole. “Hiding in Plain Sight: Steganography and the Art of Covert Communication,” Published by Wiley Publishing, Inc., Indianapolis, Indiana, Published simultaneously in Canada. 2003.Search in Google Scholar

eISSN:
1178-5608
Langue:
Anglais
Périodicité:
Volume Open
Sujets de la revue:
Engineering, Introductions and Overviews, other