2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.72
|View full text |Cite
|
Sign up to set email alerts
|

High Capacity Steganographic Method Based Upon JPEG

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
28
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(28 citation statements)
references
References 14 publications
0
28
0
Order By: Relevance
“…Additionally, the computational time of their method is a bit less than Chang et al's method as well [6].…”
Section: Related Workmentioning
confidence: 98%
See 2 more Smart Citations
“…Additionally, the computational time of their method is a bit less than Chang et al's method as well [6].…”
Section: Related Workmentioning
confidence: 98%
“…For example, from Chan et al's research, data are hidden by using simple LSB (least significant bit) with an optimal pixel adjustment process [2]. In case of the frequency domain the cover image will first be transformed from spatial domain to frequency domain before embedding the secret messages [5][6][7]. In addition, for the spatial domain method the capacity of the secret messages that can be embedded is greater than that of frequency domain method, however, it is easier to be detected with the HVS (Human Vision System).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…By using the embedding of middle frequency coefficients, Yu et al [10] , Chang et al [11] and Tseng et al [12] proposed a modified 8×8 quantization table to increase the steganography capacity and achieve acceptable visual image quality. Based on Chang's quantization table, Almohammad [13] proposed a method of dividing the cover image into nonoverlapping blocks of 16×16 pixels and gave a new quantization table, in which the quantization step size is half of Chang's, to reduce quantization error. Then, 2 bits of secret message are embedded in the LSB of every quantized middle frequency coefficients.…”
Section: Related Workmentioning
confidence: 99%
“…This quantization table will be used for comparison between our experiments. Inspired by the design of the quantization table [11,[13][14][15] , we present a new 16×16 quantization table. Compared with standard quantization table, the length of new quantization table is 2 times, and step size is half of the former.…”
Section: Related Workmentioning
confidence: 99%