2018
DOI: 10.3844/jcssp.2018.753.763
|View full text |Cite
|
Sign up to set email alerts
|

Full Capacity Image Steganography Using Seven-Segment Display Pattern as Secret Key

Abstract: Due to the vast interchange of images over the internet, exchanging secret message hidden in these images would be encouraged and the technique is referred to as image steganography. Hiding the secret data into the least significant bits of the images pixels is a common practice. However, the choice of the hidden key and the efficiency of utilizing all pixels of the carrier image is of great importance. This paper presents a new technique for key generation and embedding/extraction processes for image steganog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Two numerically determined metrics can be determined to reflect the amount of distortion produced in the encrypted images to thwart the attackers, namely the normalized mean absolute error NMAE and peak signal to noise ratio PSNR. These metrics are calculated by Equations ( 8) and ( 9), respectively [29] as follows:…”
Section: Nmae and Psnr Metricsmentioning
confidence: 99%
“…Two numerically determined metrics can be determined to reflect the amount of distortion produced in the encrypted images to thwart the attackers, namely the normalized mean absolute error NMAE and peak signal to noise ratio PSNR. These metrics are calculated by Equations ( 8) and ( 9), respectively [29] as follows:…”
Section: Nmae and Psnr Metricsmentioning
confidence: 99%
“…Information hiding is a secure message embedded into the points of the load content, either by changing or replacing data [15]. It realises good imperceptibility and full capacity that can be realised comparatively faster than in the frequency domain, but with poor robustness.…”
Section: :78mentioning
confidence: 99%
“…Mohammed Abbas Fadhil Al-Husainy [1] presented novel method for key generation for embedding-decoding procedures of steganography system image is as the carrier file. Thearbitrariness of safetykey is essential for hidingprocedure is attained with the seven segment display designs with various dimensions.…”
Section: Related Workmentioning
confidence: 99%