2015
DOI: 10.1016/j.optcom.2015.07.073
|View full text |Cite
|
Sign up to set email alerts
|

Robustness enhancement for image hiding algorithm in cellular automata domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…The image steganography outcome comes from the combination of the wavelet transform in the form of the discrete wavelet transform, linear matrix division in the form of singular value decomposition, and the scrambling method. The motive for using this technique is to provide secret image security between transmission channels [21]. Secret image security depends upon secret data invisibility in the transmission channel.…”
Section: Secret Image Embedding Algorithmmentioning
confidence: 99%
“…The image steganography outcome comes from the combination of the wavelet transform in the form of the discrete wavelet transform, linear matrix division in the form of singular value decomposition, and the scrambling method. The motive for using this technique is to provide secret image security between transmission channels [21]. Secret image security depends upon secret data invisibility in the transmission channel.…”
Section: Secret Image Embedding Algorithmmentioning
confidence: 99%
“…Our NC (ref NC) No attack 1.0 (1.0 [25], 1.0 [38]) Gaussian low-pass filter 0.827244 Median filtering (5,1) 0.8874 (0.9968 [25], 0.5743 [39], 0.9356 [40], 0.8814 [38], 0.8370 [41]) Median filtering (3,3) 0.847447 (0.7897 [42], 0.9188 [30], 0.9258 [9]) Average filter' (3,3) 0.826939 (0.7569 [42]) Gaussian noise (M � 0, V � 0.0001) 0.94806 (0.9706 [25], 0.9256 [39], 0.9387 [40], 0.9131 [38]) Salt and pepper noise (0.001) 0.984562 (0.9952 [25], 0.9287 [39], 0.9122 [40], 0.9902 [38], 0.9421 [43]) Speckle noise 0.951758 JPEG compression (Qf � 30) 0.87903 (0.9968 [25], 0.8594 [39], 0.9789 [40], 0.8469 [38]) JPEG compression (Qf � 90) 0.92956 (0.9862 [30], 0.9061 [43], 0.89109 [32]) Sharpening attack (0.2) 0.96612 (0.9138 [42], 0.9579 [9]) Sharpening attack (0.8) 0.856457 Sharpening attack (1.0) 0.8052 (0.9638 [25], 0.9877 [39], 0.9366 [40], 0.9999 [38]) Histogram equalization 0.8785 (0.8805 [11]) Motion blur 0.830194 Flip (horizontal/Vertical) 0.9912 (1.0 [19])…”
Section: Attacksmentioning
confidence: 99%
“…In the age of cloud computing and for computing, the security of data whether the sensor's data or cloud's data has become the dire need of today's age to secure it from malicious attacks. Similarly, copyright infringement problems and illegal distribution and modification while disseminating information over the Internet may arise quite frequently [1,2]. erefore, watermarking coupled with hyperchaotic encryption can cope up with the emerging challenges of copyright infringement, watermarking attacks, and security issues.…”
Section: Introductionmentioning
confidence: 99%
“…Steganography deals with secretly transmitting the piece of information by embedding it into some trivial cover image [4], [5]. Whether it is steganography or invisible digital watermarking, it offers other benefits such as (a) confirmation of content creator, (b) non-susceptibility to illegal distribution, copyright breach problems, and alteration while sending data over the internet.…”
Section: Introductionmentioning
confidence: 99%