2017
DOI: 10.24237/djes.2017.10305
|View full text |Cite
|
Sign up to set email alerts
|

Hiding (1-8) Multimedia Files in One Color Image

Abstract: This paper presents hiding one to eight gray images or texts (secret information) inside color image (cover image) based on Least Significant Bits (LSB) algorithm. The main idea is to insert the secret message (one to eight texts or one to eight gray images) in the three LSB of the cover image (color image). The color cover image RGB model (R channel, G channel and B channel) is separated into three cover images (the red cover, green cover, and blue cover). Each one of these three cover images is used to hide … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…A principal algorithm for LSB replacement is to take the first M cover pixels where M is the total length of the secret message for image where M=R×C (where R row and C column numbers in secret image) that is to be embedded in bits. After that every pixel's last bit in cover image will be substituted by one of the message bits [8].…”
Section: Least Significant Bit Substitution Methodsmentioning
confidence: 99%
“…A principal algorithm for LSB replacement is to take the first M cover pixels where M is the total length of the secret message for image where M=R×C (where R row and C column numbers in secret image) that is to be embedded in bits. After that every pixel's last bit in cover image will be substituted by one of the message bits [8].…”
Section: Least Significant Bit Substitution Methodsmentioning
confidence: 99%
“…Hence, if the results display that there are no differences between the histogram of the transmitted image and reconstructed image meaning that the new examined system could survive from the attackers. Figure 8 represented the histogram of transmitted and reconstructed of image for different values of SNR [27], [28].…”
Section: Histogram Analysismentioning
confidence: 99%
“…Mostly with advancement of technology, fresh demands for information transfer have constituted an unusual challenge for the cutting-edge cell infrastructure. Aside from the standard telecom advantages of cell phones, the current new generation, fifth generation (5G) [1], project is likely to strengthen traffic load that are in particular distinct from the previous counterparts, for illustration, machine type communication (MTC), internet of things (IoT), which seems to be using really quite tiny information transmission as discussed in [2] besides the streaming of different multimedia information [3]. Using adjustable waveforms is a crucial process for dealing with the upcoming challenges, which are shown by Banelli et al [4].…”
Section: Introductionmentioning
confidence: 99%