2021
DOI: 10.11591/eei.v10i2.2747
|View full text |Cite
|
Sign up to set email alerts
|

Robust large image steganography using LSB algorithm and 5D hyper-chaotic system

Abstract: This paper contains a robust hiding system proposed to hide and reconstruct efficiently a large size secret image based on merging encrypting and hiding. This approach deals with a video utilized as a cover of frames to hide the blocks of large image inside it. Frames are selected according to 5D hyperchaotic algorithms and consequently change value of the pixel in the original image depends on it. Secret image will divide into many blocks and hide each block in one frame selected by 5D chaotic. This method wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…The technique in [3] support and improve the information security methods with more capacity and faster transmission.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The technique in [3] support and improve the information security methods with more capacity and faster transmission.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to Fig. 3, the secret message pixels is inserted in the following order: (3,3,2). Each pixel in secret image is inserted in the LSB of the cover image (RGB) as shown in z, where z is the position of the LSB bit for each pixel.…”
Section: Bhash-lsb Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…Although video steganography bear the large size of the message [1], [18], [48], [54]- [57], [65]- [69], [20], [70]- [77], [22], [23], [33], [34], [44], [45], [47]. But it is necessary the algorithm selects the best bits to embed the information on it [11], [23], [47], [59], [69], [76], [80], [81].…”
Section: Related Workmentioning
confidence: 99%
“…In the receiver side, the reconstruction process and extraction secret audio will be opposite to the process in the sender. However, contribution of this work represents one of the series started by the authors works explained previously in [2], [4], [23] to develop image/audio steganographic techniques. Additionally, the present work will solve the security task of the stego-audio with high sensitivity, as well as the selection of cover media, length, format.…”
Section: Introductionmentioning
confidence: 99%