2013
DOI: 10.1016/j.protcy.2013.12.346
|View full text |Cite
|
Sign up to set email alerts
|

Chaos based Edge Adaptive Image Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
19
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 56 publications
(20 citation statements)
references
References 15 publications
1
19
0
Order By: Relevance
“…These techniques employ a high payload but are vulnerable to image processing manipulations and statistical attacks such as image cropping, image compressing, noise attacks and chi-square attack. Some examples of spatial domain techniques include LSB [8][9][10][11], gray-level modification method [12], edges based embedding techniques [4,[13][14][15][16], pixel indicator techniques (PIT) [17,18], pixel value differencing techniques [19,20], pixel pair matching method [21], and tri-way pixel value differencing method [22]. In transform domain, the image is converted from the spatial domain to the transform domain and the image coefficients are modified to hide secret information.…”
mentioning
confidence: 99%
“…These techniques employ a high payload but are vulnerable to image processing manipulations and statistical attacks such as image cropping, image compressing, noise attacks and chi-square attack. Some examples of spatial domain techniques include LSB [8][9][10][11], gray-level modification method [12], edges based embedding techniques [4,[13][14][15][16], pixel indicator techniques (PIT) [17,18], pixel value differencing techniques [19,20], pixel pair matching method [21], and tri-way pixel value differencing method [22]. In transform domain, the image is converted from the spatial domain to the transform domain and the image coefficients are modified to hide secret information.…”
mentioning
confidence: 99%
“…This paper proposes an edge adaptive image steganography mechanism which combines the benefits of matrix encoding and LSBM to embed data and also uses a chaotic mapping scheme to provide enhanced security to the payload. Efforts have been given to ensure that the proposed mechanism conforms to high Imperceptibility and Fidelity which are the essential quality requirements for any image steganography system [12].…”
Section: Related Workmentioning
confidence: 99%
“…There are certain regions in an image known as regions of interest (ROI) [12]. The data embedded into these regions corresponds to lesser distortion that is better quality.…”
Section: Related Workmentioning
confidence: 99%
“…Firstly it is encrypted with the help of Arnold cat map [5,12]. In Arnold cat map the secret information iterated number of times.…”
Section: Modified Reversible Data Hiding Schemementioning
confidence: 99%