2013
DOI: 10.3906/elk-1205-58
|View full text |Cite
|
Sign up to set email alerts
|

Data hiding in digital images using a partial optimization technique based on the classical LSB method

Abstract: This paper presents a new partial optimization approach for the least significant bit (LSB) data hiding technique that can be used for protecting any secret information or data. A deterioration effect of as little as possible in an image is intended using the LSB data hiding technique and this is well realized utilizing the proposed partial optimization approach achieving the same data embedding bit rates. In the proposed approach, all of the image pixels are classified into 8 regions and then the 8 distinct o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 12 publications
(12 reference statements)
0
6
0
Order By: Relevance
“…Least significant bits of each byte of the cover object are replaced with secret message bits in this technique [8]. For example, the letter "a" ((97) ASCII = (01100001) 2 ) can be easily hidden inside eight bytes of a cover data as seen in Table 1.…”
Section: Lsb Coding Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…Least significant bits of each byte of the cover object are replaced with secret message bits in this technique [8]. For example, the letter "a" ((97) ASCII = (01100001) 2 ) can be easily hidden inside eight bytes of a cover data as seen in Table 1.…”
Section: Lsb Coding Techniquementioning
confidence: 99%
“…The goal of steganalysis is to identify suspected data determine whether or not they have a payload encoded into them, and, if possible, recover that payload [8][9][10][11]. In this paper, a visual steganalysis technique has been proposed for LSB-encoded audio data based on frequency domain characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, as the proposed method is tested on images of Lena, Tiffany, House, Pepper, Baboon, Jet, and Lake, the PSNR value for 32 KB is 53.52-53.55 dB, while it is 51.12-51.15 dB for the LSBR method. Table 5 shows the performances of the proposed method as well as the other 7 methods [7,[25][26][27][28][29][30], which have been developed in recent years. Several images, sizes, and payloads units of the available literature have been used.…”
Section: Image Quality Performance Of the Stego Imagementioning
confidence: 99%
“…In steganography, the objects used for hiding the secret data are called cover objects, which can be text, image, video, sound data, etc. The combination of the cover object and the secret data hidden by it is called the stego object, which may appear as an ordinary text, image, video, or sound data [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…In the spatial domain, the watermark is embedded by modifying the pixel values in the original image. The simplest spatial domain watermarking technique is to embed the bits of the message directly into the least * Correspondence: onur.jane@tubitak.gov.tr significant bit plane of the cover image [3]. Transform domain watermarking is similar to spatial domain watermarking; in this case, the coefficients of transforms such as discrete cosine transform (DCT), discrete Fourier transform (DFT), or discrete wavelet transform (DWT) are modified [4].…”
Section: Introductionmentioning
confidence: 99%