2011 3rd International Conference on Computer Research and Development 2011
DOI: 10.1109/iccrd.2011.5764240
|View full text |Cite
|
Sign up to set email alerts
|

A steganographic method based on the JPEG digital images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The sub band LL gives the approximation to the input image while the LH represents the rows of the image that means it extracts the horizontal image, HL extracts the vertical features of the image, And HH extracts the edges along the diagonals of the image. Next Each small frame is divided to four sub-sub-parts and repeat the steps [3].…”
Section: General Algorithms Used In Video Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…The sub band LL gives the approximation to the input image while the LH represents the rows of the image that means it extracts the horizontal image, HL extracts the vertical features of the image, And HH extracts the edges along the diagonals of the image. Next Each small frame is divided to four sub-sub-parts and repeat the steps [3].…”
Section: General Algorithms Used In Video Watermarkingmentioning
confidence: 99%
“…In that the crucial technologies are Steganography, cryptography and Watermarking. The Steganography methods doesn't provide enough security against removing or modification of hidden message [3]. In the Cryptography the data is transmitted through a public network as a secret code, in the encryption algorithm the cipher text called the original text in the coded format.…”
Section: Introductionmentioning
confidence: 99%
“…In order to recover the principal picture losslessly, the riddle data has to be removed from stego-images. Cui-ling JIANG et al, [2] have offered the spread picture which is detached into non-covering squares of 16×16 pixels instead of standard parceling spread picture into 8×8 pieces and the DCT is used to change each square. The beauty of the DCT coefficients is, they are quantized and subsequently embedded the messages secretly.…”
Section: Literature Surveymentioning
confidence: 99%