2013
DOI: 10.5815/ijigsp.2013.06.04
|View full text |Cite
|
Sign up to set email alerts
|

A New Steganography Technique Using Snake Scan Ordering Strategy

Abstract: In this paper, we propose a new steganography technique using the snake scan ordering strategy. The proposed method hides the secret data that is an image in another image, known as the cover image. In this method, the pixel values of the secret image are organized in snake scan order, which are preprocessed to reduce their size. The resultant data is embedded into the Least Significant Bits (LSBs) of the pixels of the cover image. To minimize the error/distortion, the pixel values of the stegoimage are adjust… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 36 publications
(35 reference statements)
0
6
0
Order By: Relevance
“…The image can be manipulated in the transform domain (frequency domain) or spatial domain [9,28]. The spatial domain directly manipulates the pixel values of an image whereas the transform domain deals with the rate at which the values of the pixels are changing in the spatial domain.…”
Section: Image In Steganography and Steganalysismentioning
confidence: 99%
“…The image can be manipulated in the transform domain (frequency domain) or spatial domain [9,28]. The spatial domain directly manipulates the pixel values of an image whereas the transform domain deals with the rate at which the values of the pixels are changing in the spatial domain.…”
Section: Image In Steganography and Steganalysismentioning
confidence: 99%
“…In image steganography, the cover media is the cover image and the stegomedia is the stegoimage. The images can be manipulated in either spatial domain or frequency domain and accordingly there are two main classes into which the steganography techniques may be divided [8].…”
Section: Steganography Cryptography Definitionmentioning
confidence: 99%
“…Tus, it fnds applications in the military, medical imaging, and diplomacy. Data hiding usually alters the values of pixels of cover images to conceal sensitive information so as to prevent its unauthorized peeking or damage [1,2]. In 1983, Simmons was arguably the frst to propose the idea of data hiding [3,4].…”
Section: Introductionmentioning
confidence: 99%