2022
DOI: 10.3390/e24020246
|View full text |Cite
|
Sign up to set email alerts
|

Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage

Abstract: On the basis of ensuring the quality and concealment of steganographic images, this paper proposes a double-matrix decomposition image steganography scheme with multi-region coverage, to solve the problem of poor extraction ability of steganographic images under attack or interference. First of all, the cover image is transformed by multi-wavelet transform, and the hidden region covering multiple wavelet sub-bands is selected in the wavelet domain of the cover image to embed the secret information. After deter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 44 publications
0
10
0
Order By: Relevance
“…From the result table, it shows that there is little difference between the cover image and stego image after data hiding. Similarly negligible difference in original massage image and extracted image [13]. In practical scenario any technique must subjected with noise while transmitting stego image from one place to other place.…”
Section: ░ 5 Simulation Resultsmentioning
confidence: 98%
“…From the result table, it shows that there is little difference between the cover image and stego image after data hiding. Similarly negligible difference in original massage image and extracted image [13]. In practical scenario any technique must subjected with noise while transmitting stego image from one place to other place.…”
Section: ░ 5 Simulation Resultsmentioning
confidence: 98%
“…A digital image steganography research was done by Pan et al. [4] in 2022 with title ‘Double‐Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi‐Region Coverage’ and the experimental results demonstrate that the proposed technique has a good performance in imperceptibility of medium and best quality of extracted secret image after some attacks such as Gaussian noise, salt and pepper noise, speckle noise, JPEG compression, JPEG2000 compression, sharpening attack, histogram, equalization and motion blur. The method consists by transforming the host image by multi‐wavelet transform and the non‐sensible or hidden regions selected in the wavelet domain are exploited for mark insertion.…”
Section: Literature Surveymentioning
confidence: 99%
“…Before going to watermarking experience, we compare our technique with steganography state of art cited in paragraph 2. The scheme in [4,[6][7][8] shows the experience without attack; however, Zaidan [5] did the test without and with different attacks so we have two separate tables (Tables 9, 10). Note the experience done by Zaidan [5], the secret image was Peppers so we take it as a watermark image.…”
Section: Experimentations: Steganography Watermarking Encryptionmentioning
confidence: 99%
“…A steganography algorithm has been proposed in Ref. [11] where a combination of DWT and hidden region is selected in the DWT domain. A steganography method, where DWT is applied to compress an input image and DFT is applied on the carrier to calculate the coefficients in Ref.…”
Section: Literature Reviewmentioning
confidence: 99%