A Further Enhancement of Least Significant BIT Algorithm applied in image Steganography Stephannie Carl G. Chavez, and Joana Clariz S. Jacinto. 6

By: Chavez, Stephannie Carl G. and Jacinto, Joana Clariz S. 4 0 16, [, ] | [, ] |
Contributor(s): 5 6 [] |
Language: Unknown language code Summary language: Unknown language code Original language: Unknown language code Series: ; 201846Edition: Description: 28 cm. 205 ppContent type: text Media type: unmediated Carrier type: volumeISBN: ISSN: 2Other title: 6 []Uniform titles: | | Related works: 1 40 6 []Subject(s): -- 2 -- 0 -- -- | -- 2 -- 0 -- 6 -- | 2 0 -- | -- -- 20 -- | | -- -- -- -- 20 -- | -- -- -- 20 -- --Genre/Form: -- 2 -- Additional physical formats: DDC classification: | LOC classification: | | 2Other classification:
Contents:
Action note: In: Summary: ABSTRACT: Steganography is the art of hiding confidential information (secret) within any media file (cover media) to produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or recovered by unauthorized recipients. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected the system will fail but data security depends on the robustnss of the applied algorithm. Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. The stego-image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). The various applications of steganography include secure military communications, multimedia watermaking and fingerprinting applications for authentication purposed to curb the problem of digital piracy. The main advantage of the proposed algorithm is to randomize the embedding of data inside the image, to keep the size of the cover image constant while the secret message increased in size, and to accept other languages. Experimental results validate that the proposed method not only enhances the visual quality of stego images but also provides good imperceptibility and multiple security levels as compared to several existing prominent methods. Other editions:
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Collection Call number Status Date due Barcode Item holds
Book PLM
PLM
Filipiniana Section
Filipiniana-Thesis QA76.9.A43 C32.2018 (Browse shelf) Available FT6464
Total holds: 0

Undergraduate Thesis: (BSCS major in Computer Studies) - Pamantasan ng Lungsod ng Maynila, 2018. 56

5

ABSTRACT: Steganography is the art of hiding confidential information (secret) within any media file (cover media) to produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or recovered by unauthorized recipients. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected the system will fail but data security depends on the robustnss of the applied algorithm. Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. The stego-image is the result we get by running the algorithm you select on the message (file to hide) and cover (image). The various applications of steganography include secure military communications, multimedia watermaking and fingerprinting applications for authentication purposed to curb the problem of digital piracy. The main advantage of the proposed algorithm is to randomize the embedding of data inside the image, to keep the size of the cover image constant while the secret message increased in size, and to accept other languages. Experimental results validate that the proposed method not only enhances the visual quality of stego images but also provides good imperceptibility and multiple security levels as compared to several existing prominent methods.

5

There are no comments for this item.

to post a comment.

© Copyright 2024 Phoenix Library Management System - Pinnacle Technologies, Inc. All Rights Reserved.