2018
DOI: 10.11591/ijece.v8i4.pp2091-2097
|View full text |Cite
|
Sign up to set email alerts
|

Text in Image Hiding using Developed LSB and Random Method

Abstract: <p><span>Information Hiding is a task that face difficult challenges in current time. <br /> The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…In the channel of information, the noise is any degradation in the image signal caused by external disturbance such as: Wireless transmission, Satellite transmission and Network cable transmission [21][22][23]. Therefore, filtering of an image corrupted by noise is a significant area of image restoration [23][24][25] and depending on the type of disturbance in the signal [25][26][27][28]. For testing the proposed system against different types of noise (white noise, salt and pepper noise.)…”
Section: Key Space and Sensitivitymentioning
confidence: 99%
“…In the channel of information, the noise is any degradation in the image signal caused by external disturbance such as: Wireless transmission, Satellite transmission and Network cable transmission [21][22][23]. Therefore, filtering of an image corrupted by noise is a significant area of image restoration [23][24][25] and depending on the type of disturbance in the signal [25][26][27][28]. For testing the proposed system against different types of noise (white noise, salt and pepper noise.)…”
Section: Key Space and Sensitivitymentioning
confidence: 99%
“…The hybrid combination of Modified LSB and image segmentation is used before embedding the secret images randomly. Similarly, Abbood et al [13] presented the Developed LSB and random technique for text in image hiding. The secret text is hidden in the cover image using the random method and use the hash function to hide the secret text in a selected column to generate the stegano image.…”
Section: Related Workmentioning
confidence: 99%
“…The digital watermarking application using image steganography is presented in Chandran et al [20] using different approaches like Discrete Cosine Transform (DCT), DWT, and LSB methods. Most of the recent image steganography articles from [9][10][11][12][13][14][15][16][17][18][19][20] are software-based approaches. Almutairi et al [21] presented the hardware-based steganography using secured LSB method with security, and similarly, the hybrid approach using Haar DWT and Modified LSB method for steganography is made by Simha et al [22] on a hardware platform.…”
Section: Related Workmentioning
confidence: 99%
“…In image steganography, a possibility to prevent a hidden message from being discovered by statistical steganalysis is the most important requirement [1]. Consequently, there are many image steganography methods (such as [2][3][4]) are developed to transfer valuable data in a secure way. Block based data hiding [5][6][7][8][9][10][11] and channel selection rule [1,[12][13][14] are two effective image steganography approaches for minimizing distortions to the cover images.…”
Section: Introductionmentioning
confidence: 99%