Fast communication: Steganography and error-correcting codes
Signal Processing
A steganographic method based upon JPEG and particle swarm optimization algorithm
Information Sciences: an International Journal
Lossless data hiding for color images based on block truncation coding
Pattern Recognition
The upper and lower bounds of the information-hiding capacity of digital images
Information Sciences: an International Journal
Soft Computing - A Fusion of Foundations, Methodologies and Applications - Special Issue on Bio-Inspired Information Hiding; Guest editors: Jeng-Shyang Pan, Ajith Abraham
Asymptotic behavior of the ZZW embedding construction
IEEE Transactions on Information Forensics and Security
A novel data hiding scheme based on modulus function
Journal of Systems and Software
Edge adaptive image steganography based on LSB matching revisited
IEEE Transactions on Information Forensics and Security
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
BSS: Boosted steganography scheme with cover image preprocessing
Expert Systems with Applications: An International Journal
Embedding capacity raising in reversible data hiding based on prediction of difference expansion
Journal of Systems and Software
Varying radix numeral system based adaptive image steganography
Information Processing Letters
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
Design of an ultra high speed AES processor for next generation IT security
Computers and Electrical Engineering
Lossless data hiding in JPEG bitstream
Journal of Systems and Software
Intelligent reversible watermarking in integer wavelet domain for medical images
Journal of Systems and Software
Journal of Systems and Software
Genetic algorithm based methodology for breaking the steganalytic systems
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
IEEE Transactions on Information Theory
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
IEEE Transactions on Information Forensics and Security - Part 2
Hi-index | 0.00 |
In this paper, we propose a new steganography algorithm using non-uniform adaptive image segmentation (NUAIS) with an intelligent computing technique to conceal efficiently a large amount of confidential messages (Smsg) into color images. Whereas, the number of secret bits to be replaced is non uniform from byte to another byte; it based on byte characteristics, which are extracted by using 16 byte levels (BL) with variance distribution of the Neighboring Eight Bytes (NEB) around the current byte. Four security layers are introduced to increase resistance against statistical and visual attacks. These layers are designed to make an excellent imperceptible concealing Smsg with lower distortion of a color plane and high protection of Smsg. The proposed intelligent technique using the hybrid adaptive neural networks and modified adaptive genetic algorithm employing uniform adaptive relaxation (ANN_AGAUAR) is working as the fourth security layer to improve the quality of the stego image (I"s). The results are discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm's effectiveness can be concealed efficiently the number of secret bits reached to four bits per byte with better visual quality.