2018
DOI: 10.1007/s11042-018-5713-2
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 46 publications
(11 citation statements)
references
References 45 publications
0
11
0
Order By: Relevance
“…However, transform methods suffer from a traditional trade-off between capacity and imperceptibility. This relationship was exhaustively investigated by Rabie and Kamel [5], [16], [17] and Rabie et al [18], [19] for image-based steganography, but never before investigated in-depth for video-based steganography schemes.…”
Section: Related Workmentioning
confidence: 99%
“…However, transform methods suffer from a traditional trade-off between capacity and imperceptibility. This relationship was exhaustively investigated by Rabie and Kamel [5], [16], [17] and Rabie et al [18], [19] for image-based steganography, but never before investigated in-depth for video-based steganography schemes.…”
Section: Related Workmentioning
confidence: 99%
“…For large-scale multimedia applications, Li et al proposed an image steganography technology that uses cosine transform to obtain an image steganography capacity of 21.5 bpp when the signal-to-noise ratio is 38.24 dB [ 28 ]. Another high-capacity image steganography scheme is proposed by Rabie et al [ 29 ], which uses the multi-scale Laplacian pyramid of the cover image in wavelet domain to realize data embedding, and they use the method of curve fitting adaptive region to find the appropriate hiding position in the DCT domain. Thanki et al proposed an image steganography technique based on Finite Ridge Transform (FRT) and Discrete Wavelet Transform (DWT).…”
Section: Introductionmentioning
confidence: 99%
“…For image compression, various constraints are enforced; including processing power, data traffic and bandwidth, which can influence image quality (i.e., image degradation) and/or losses the embedded data are also compressed before transmission with the intention of transmission to speed [4]. Studies have also demonstrated the negative side of compressive photos of JPEG such as JPEG blockage, the product of the discrete cosine transform loss function dependent on 8 to 8 compression blocks normal JPEG [17], as well as lost details due to compressed picture deformation [18]. Nevertheless, this approach is subjected to multiple attacks, such as an additive white Gaussian noise (AWGN), image rescaling, JPEG distortion and a filter attack [19].…”
Section: Introductionmentioning
confidence: 99%