2014
DOI: 10.1007/s11042-014-2237-2
|View full text |Cite
|
Sign up to set email alerts
|

An efficient steganographic framework based on dynamic blocking and genetic algorithm

Abstract: An important property of any robust steganographic method is that it must introduce minimal distortion in the created stego-images. This objective is achieved if one can maximize the similarity between the pixels value of the cover image and the secret data. In the proposed framework, the maximal similarity is obtained by arranging some routes along the pixel positions. Our novel method is based on dynamic blocking and the genetic algorithm which decreases the distortion produced by a base data embedding metho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Image steganographic algorithms, which have been discussed in literature, can be classified based on the embedding domain into two main classes: spatial domain and transform domain [14,[25][26][27]. The spatial domain algorithms are most frequently used because of their good concealment, great capability to hide information, and ease of realization [28].…”
Section: Related Workmentioning
confidence: 99%
“…Image steganographic algorithms, which have been discussed in literature, can be classified based on the embedding domain into two main classes: spatial domain and transform domain [14,[25][26][27]. The spatial domain algorithms are most frequently used because of their good concealment, great capability to hide information, and ease of realization [28].…”
Section: Related Workmentioning
confidence: 99%
“…The main steganographic methods in the spatial domain [ 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ] are LSB-based (Low Significant Bit). Recently, entropy has also been extensively used to support data-hiding algorithms [ 18 , 19 , 20 ].…”
Section: Introductionmentioning
confidence: 99%
“…This shortcoming can be overcome by introducing the neural network (NN) based steganographic technique, where the NN uses a distributed representation to store the learning knowledge. Thus, accessing the concealed data without knowing the topology of the NN appears practically infeasible [ 1 ]. Although some researchers prefer models with interpretability power such as explicit mathematical or statistical models or even heuristically encoded models such as fuzzy models, it has been proved that black box type of models when learning is feasible have more capability of capturing complicated knowledge and proving functionality in real world type of systems [ 2 ][ 3 ][ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, spatial or frequency domain techniques are integrated with other techniques including artificial NN (ANN), genetic algorithm (GA), or both to attain enhanced steganographic performances. Spatial-domain based GAs are used [ 1 ], [ 24 ] to minimize the distortion and. GA and ANN are used [ 25 ] to accelerate the training speed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation