2014
DOI: 10.1007/978-3-319-07674-4_42
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Distributed Image Steganography Method Based on Block-DCT

Abstract: Distributed Image Steganography (DIS) is a method of hiding secret information in multiple carrier images, making it more difficult to trace than conventional steganographic techniques, and requiring a collection of affected images for the retrieval of the secret data. In this paper we concentrate on performing DIS on grayscale images using Block-DCT (Discrete Cosine Transformation). Distributed Image Steganography using Block-DCT adds to the security of DIS by embedding the secret data in the Frequency Domain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Distributed steganography [32,33] is an improvement of classical steganography which aims at fragmenting a secret and then hidden in several covert media, which makes it more difficult to detect the whole secret message. This is applied when there are various independent senders and only one recipient.…”
Section: Distributed Steganographymentioning
confidence: 99%
“…Distributed steganography [32,33] is an improvement of classical steganography which aims at fragmenting a secret and then hidden in several covert media, which makes it more difficult to detect the whole secret message. This is applied when there are various independent senders and only one recipient.…”
Section: Distributed Steganographymentioning
confidence: 99%
“…Multi-cloud is a multiple public or private cloud service where data is stored and processed. Advantages: A single file fragmented and stored in multiple clouds, difficult to identify a single file, difficult to integrate all the blocks without key, It generates multiple stego-message of one secret code to make it difficult for an attacker and disadvantages: Monitoring multiple clouds for a single file, take high execution time [9,10]. In a recent survey, a public algorithm was proposed [11], where the receiver is one and communication channels are many to transfer the data.…”
Section: Introductionmentioning
confidence: 99%