Comparison of Steganography at One LSB and Two LSB Positions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of LSB and PVD Steganography Methods

Now a day's as the internet is widely in-use hence the information is transferred with a single click. Information is transferred usingviz; images, videos, texts but the most popular

متن کامل

Detecting LSB Steganography in Images

In this paper, we present techniques to detect Least Significant Bit (LSB) steganography for images. Here, images can be hidden inside lower bits of the pixels of the cover image. We use image statistics to detect two cases when hidden image is stored as one big chunk (Simple Mode) or spread out(Shuffle Mode). The results are presented on a synthetically generated database of around 350 stegano...

متن کامل

Wavelet based Non LSB Steganography

------------------------------------------------------------------ABSTRACT----------------------------------------------------------------Steganography is the methods of communicating secrete information hidden in the cover object. The messages hidden in a host data are digital image, video or audio files, etc, and then transmitted secretly to the destination. In this paper we propose Wavelet b...

متن کامل

Analysis of LSB based image steganography techniques

But practical implementation of the definition is not feasible, so pragmatic approach would be to make the algorithm as strong as possible. Steganography is most widely formulated in terms of the prisoner’s problem where Alice and Bob are two inmates who wish to communicate in order to hatch an escape plan. However, all communication between them is examined by the warden, Wendy, who will put t...

متن کامل

StegExpose - A Tool for Detecting LSB Steganography

Steganalysis tools play an important part in saving time and providing new angles of attack for forensic analysts. StegExpose is a solution designed for use in the real world, and is able to analyse images for LSB steganography in bulk using proven attacks in a time efficient manner. When steganalytic methods are combined intelligently, they are able generate even more accurate results. This is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2012

ISSN: 0975-8887

DOI: 10.5120/7668-0949