2020
DOI: 10.1016/j.asoc.2020.106257
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Image Steganographic Method based on Integer Wavelet Transformation and Particle Swarm Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 62 publications
(31 citation statements)
references
References 50 publications
0
31
0
Order By: Relevance
“…First, the cover and secret images are divided into four separate blocks. en, for each block, the CPSO algorithm is applied (1) Divide the cover and secret images into blocks using the X-Side-Length and Y-Side-Length particles (2) For each block, convert the secret image into a sequence of bits using the SB-Pole and SB-dire particles (3) if (SB-Pole � 1) (4) Complement the secret bits (5) end if (6) if (SB-dire � 1) (7) Reverse the direction of the secret bits (8) end if (9) Create a sequence of cover pixels using the Direction, X-offset, and Y-offset particles (10) Convert the cover pixels sequence into a sequence of bits using the Bit-Planes and BB-dire particles (11) Apply the CPSO algorithm (Algorithm 1) ( 12) if (number of secret bits < cover pixel bits) (13) Embed secret bits into corresponding cover pixel bits (14) Embed the particles into the last row of cover image (15) Calculate PSNR of the stego-image (16) end if ALGORITHM 2: Pseudocode of data embedding. 6 Security and Communication Networks…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…First, the cover and secret images are divided into four separate blocks. en, for each block, the CPSO algorithm is applied (1) Divide the cover and secret images into blocks using the X-Side-Length and Y-Side-Length particles (2) For each block, convert the secret image into a sequence of bits using the SB-Pole and SB-dire particles (3) if (SB-Pole � 1) (4) Complement the secret bits (5) end if (6) if (SB-dire � 1) (7) Reverse the direction of the secret bits (8) end if (9) Create a sequence of cover pixels using the Direction, X-offset, and Y-offset particles (10) Convert the cover pixels sequence into a sequence of bits using the Bit-Planes and BB-dire particles (11) Apply the CPSO algorithm (Algorithm 1) ( 12) if (number of secret bits < cover pixel bits) (13) Embed secret bits into corresponding cover pixel bits (14) Embed the particles into the last row of cover image (15) Calculate PSNR of the stego-image (16) end if ALGORITHM 2: Pseudocode of data embedding. 6 Security and Communication Networks…”
Section: Resultsmentioning
confidence: 99%
“…Reverse the direction of the secret bits (10) end if (11) Extract the secret pixels from the secret bits (12) Render secret image using the secret pixels (13) end ALGORITHM 3: Pseudocode of data extraction. Security and Communication Networks to find the best pixel locations to embed the secret bits such that the PSNR of the stego-image is maximized.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations