2010 International Conference on Signal Acquisition and Processing 2010
DOI: 10.1109/icsap.2010.40
|View full text |Cite
|
Sign up to set email alerts
|

Cover Image Preprocessing for More Reliable LSB Replacement Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…This is a sizable amount of data: for a 512x512 image, this amounts to a 300kB secret key that must be securely exchanged along with the image. A related approach was explored in [38] where half of the image LSBs are flipped after embedding so that SPA and RS tests are fooled into concluding that images are maximally embedded regardless of the true embedding rate. While indeed these tests are in error, it is not clear how this result safeguards the stego image since such a detection would likely arouse suspicion that the image was either fully LSB embedded or had at least been tampered with.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This is a sizable amount of data: for a 512x512 image, this amounts to a 300kB secret key that must be securely exchanged along with the image. A related approach was explored in [38] where half of the image LSBs are flipped after embedding so that SPA and RS tests are fooled into concluding that images are maximally embedded regardless of the true embedding rate. While indeed these tests are in error, it is not clear how this result safeguards the stego image since such a detection would likely arouse suspicion that the image was either fully LSB embedded or had at least been tampered with.…”
Section: Related Workmentioning
confidence: 99%
“…This is not the case with the most secure adaptive methods, which require relatively complex software routines, more computational time, and in many cases additional secret data for complete message extraction. Due to its continued relevance, there has been some effort in recent years to improve the security of LSB embedding against some of the more successful traditional attacks [33], [34], [35], [36], [37], [38], [39], [40]. These efforts have primarily targeted the RS [2] and Sample Pairs analysis (SPA) [3], [4], and have generally sought to evade them by preserving the image statistics they target either by manipulating them prior to or after embedding, or via embedding strategies that preserve them in place.…”
Section: Introductionmentioning
confidence: 99%
“…The author proposed a new method for reliably estimating the length of a hidden message and for achieving reliability in the image, based on an analysis of adjacent pixel pairs. The results were predicted using the properties of the stego image [31]. High payload image steganography using two way block matching and a hop embedding scheme has been proposed for searching for the highest similarity between blocks for each block of the important image [32].…”
Section: Related Workmentioning
confidence: 99%
“…W. Naji et al, [17] presented an overview of the steganography approaches and its classifications and also the type of attacks on the hidden information. Shreelakshmi R et al, [18] proposed pre-processing technique for cover images, which increases the reliability of LSB replacement steganography in spatial domain. Saeed Sarreshbedari and Shahrokh Ghaemmaghami [19] developed a high capacity image steganography using wavelet transform coefficient of the cover image to embed the secret information.…”
Section: Related Workmentioning
confidence: 99%