2013
DOI: 10.5120/9940-4572
|View full text |Cite
|
Sign up to set email alerts
|

Secure Information Transmission using Steganography and Morphological Associative Memory

Abstract: This paper presents a new steganography algorithm based on Morphology associative memory. Often, steganalysis methods are created to detect steganography algorithms using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In this paper, cover images are mapped to morphological representation by using morphology transform containing morphological coefficients, and each bit of secret message is inserted in the least significant bit of morphological coefficients. To evaluate stego quality, we m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…Peak signal to noise ratio of the proposed and existing steganography algorithms for test images "Lena", "Peppers", "Cameraman," and "House". Morphological steganography [25] Proposed method WBS BBS WBS BBS 2000 59 58 44 45 39 41 5000 63 64 49 51 42 46 10000 62 66 56 59 48 51 WBS, wavelet-based steganalysis; BBS, block-based steganalysis.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Peak signal to noise ratio of the proposed and existing steganography algorithms for test images "Lena", "Peppers", "Cameraman," and "House". Morphological steganography [25] Proposed method WBS BBS WBS BBS 2000 59 58 44 45 39 41 5000 63 64 49 51 42 46 10000 62 66 56 59 48 51 WBS, wavelet-based steganalysis; BBS, block-based steganalysis.…”
Section: Discussionmentioning
confidence: 99%
“…Then, the modified image is inversely transformed to its original domain. In this category, the most frequent transforms are discrete cosine transform (DCT) [2,[9][10][11][12][13][14], discrete Fourier transform [15,16], discrete wavelet transform (DWT) [17][18][19], discrete contourlet transform [20][21][22], and morphology transform [5][6][7][23][24][25]. Because JPEG compression uses DCT transform, embedding in DCT domain is very famous.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…There are two common techniques of embedding in image steganography; spatial domain and transform domain [5].According to spatial domain, the secret data or secret message has directly embedded into the LSBs (Least Significant Bit) of image pixels. One of the most known examples of spatial domain method is LSB insertion [6].…”
Section: Introductionmentioning
confidence: 99%