2010
DOI: 10.1002/sec.243
|View full text |Cite
|
Sign up to set email alerts
|

HYSA: HYbrid steganographic approach using multiple steganography methods

Abstract: The aim of image steganography is to hide data in an image with visual and statistical invisibility. There have been a number of steganography techniques proposed over the past few years. In sequence, the development of these methods has led to an increased interest in steganalysis techniques. Most of the steganalysis methods attempt to estimate cover image statistics. One way to provide a secure steganography method is to disturb the estimation of steganalyzers. The main concern of this paper is to resist aga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…If t = π/2, then x(t) = À0.5 * 0 À 1.5 * 1 + 1.5 = 0; y(t) = 0.5 × 0 À 1.5 × 1 + 1.5 = 0; Hence, the coordinate is (0, 0) in first quadrant, and the other coordinates are (2, 1), (3,3) and (1,2).…”
Section: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…If t = π/2, then x(t) = À0.5 * 0 À 1.5 * 1 + 1.5 = 0; y(t) = 0.5 × 0 À 1.5 × 1 + 1.5 = 0; Hence, the coordinate is (0, 0) in first quadrant, and the other coordinates are (2, 1), (3,3) and (1,2).…”
Section: Examplementioning
confidence: 99%
“…Information security should be true, discrete and should be based on the available data. Steganography is one of the secure data communications for highsecurity message transmission [1][2][3][4][5]. This is a method that embeds secret information into a cover file.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the hybrid steganographic methods are more secure, because many steganalysis detection attacks are specifically designed to target a singular steganography method [10][11][12]32]. Thus hybrid embedding approaches generally confuse the statistical steganalysis methods used to detect the stego-images [33].…”
Section: Introductionmentioning
confidence: 99%
“…Adaptive steganography schemes like WOW [13], started with the advancement of coding schemes [14] capable of embedding messages while nearly optimally minimizing arbitrarily defined additive distortion functions. Since the capacity of steganography methods is limited based on the properties of images, and the goal of the steganography methods is to be undetectable, the researches in [15][16][17][18] are about increasing the embedding capacity of steganography methods to provide the capability of embedding larger secret messages.…”
Section: -Introductionmentioning
confidence: 99%