Concealing a Secret Image Using the Breadth First Traversal Linear Quad tree Structure
CODAS '01 Proceedings of the Third International Symposium on Cooperative Database Systems for Advanced Applications
Blind watermarking applied to image authentication
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
Rotation, scale, and translation resilient watermarking for images
IEEE Transactions on Image Processing
Region-based image watermarking
IEEE Transactions on Image Processing
Data hiding watermarking for halftone images
IEEE Transactions on Image Processing
Geometrically invariant watermarking using feature points
IEEE Transactions on Image Processing
Steganalysis using image quality metrics
IEEE Transactions on Image Processing
Is image steganography natural?
IEEE Transactions on Image Processing
Correlation between PSNR and size ratio in audio steganography
SITE'12 Proceedings of the 11th international conference on Telecommunications and Informatics, Proceedings of the 11th international conference on Signal Processing
Correlation between PSNR and bit per sample rate in audio steganography
SITE'12 Proceedings of the 11th international conference on Telecommunications and Informatics, Proceedings of the 11th international conference on Signal Processing
Hi-index | 0.00 |
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems – weaknesses – of substitution techniques are investigated which if they could be solved, the large capacity – strength – of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic concept, message bits are embedded into multiple, LSB layers, resulting in increased capacity.