A genetic algorithm based steganography using discrete cosine transformation (GASDCT)

A Khamrui, JK Mandal - Procedia Technology, 2013 - Elsevier
In this paper a Genetic Algorithm based steganographic technique in frequency domain
using discrete cosine transform has been proposed. A 2× 2 sub mask of the source image is …

[PDF][PDF] IMAGE STEGANOGRAPHY BASED ON ODD/EVEN PIXELS DISTRIBUTION SCHEME AND TWO PARAMETERS RANDOM FUNCTION.

M Mahdi Hashim, MS MOHD RAHIM - Journal of Theoretical & Applied …, 2017 - jatit.org
Presently, the evolution massive of the internet gives more attention, play important role in
the field of communication, and transfer messages. Nowadays, hiding sensitive or secret …

An efficient multi-bit steganography algorithm in spatial domain with two-layer security

N Mukherjee, G Paul, SK Saha - Multimedia Tools and Applications, 2018 - Springer
Steganography is a very useful technique which aims at preventing loss of privacy during
the process of data communication, especially over the internet. It can involve different forms …

A steganographic method for images by pixel-value differencing

DC Wu, WH Tsai - Pattern recognition letters, 2003 - Elsevier
A new and efficient steganographic method for embedding secret messages into a gray-
valued cover image is proposed. In the process of embedding a secret message, a cover …

High payload image steganography with reduced distortion using octonary pixel pairing scheme

C Balasubramanian, S Selvakumar… - Multimedia tools and …, 2014 - Springer
The crucial challenge that decides the success of any steganographic algorithm lies in
simultaneously achieving the three contradicting objectives namely—higher payload …

Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function

G Swain - Optik, 2019 - Elsevier
This paper proposes two steganography techniques,(i) quotient value differencing (QVD),
and (ii) pixel value differencing with modulus function (MFPVD). The QVD technique …

Nested image steganography scheme using QR-barcode technique

WY Chen, JW Wang - Optical Engineering, 2009 - spiedigitallibrary.org
In this paper, QR bar code and image processing techniques are used to construct a nested
steganography scheme. There are two types of secret data (lossless and lossy) embedded …

Very high capacity image steganography technique using quotient value differencing and LSB substitution

G Swain - Arabian Journal for Science and Engineering, 2019 - Springer
This article proposes a very high capacity steganography technique using differencing and
substitution mechanisms. It divides the image into non-overlapped 3 * 3 3× 3 pixel blocks …

Clustering steganographic modification directions for color components

W Tang, B Li, W Luo, J Huang - IEEE Signal Processing Letters, 2015 - ieeexplore.ieee.org
It is conventionally assumed that steganographic schemes for gray-scale images can be
directly applied to color images by embedding messages independently in different color …

A new image steganography based on first component alteration technique

A Kaur, R Dhir, G Sikka - arXiv preprint arXiv:1001.1972, 2010 - arxiv.org
In this paper, A new image steganography scheme is proposed which is a kind of spatial
domain technique. In order to hide secret data in cover-image, the first component alteration …