A new approach for color image steganography using HSI color model

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 640

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

COMCONF04_206

تاریخ نمایه سازی: 10 تیر 1396

Abstract:

Security has always been a basic necessity. In the meantime, the most important systems of information security, cryptography and steganography are more noticeable than the others. In recent years Steganography, specially steganography in digital images has been a great interest for many researchers. In this article, a new approach for color image steganography using HSI color model and LSB embedding methods has been presented. The results have shown it has good perceptual transparency and high security. I hope this article helps future researchers and future studies.

Authors

Reza Kianersi

M.Sc. Student in IT Computer Networking trends, Safahan Institute for Higher Education

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • M. Omoomi, Thesis "increase the embedding efficiency _ steganography methods ...
  • A. S. Hameed, "Hiding of Speech based on Chaotic Steganography ...
  • N. K. Pareek , V. Patidar and K K. Sud, ...
  • F. Dachselt and W. Schwarz, "Chaos and Cryptography, " IEEE ...
  • L. Kocarev, "Chaos-Based Cryptography: A Brief Overview, " IEEE Circuits ...
  • S. Saxena, "Secure Data Transfer through a Combination of Steganographic ...
  • D. C. Lou and C. H Sung, "A Steganographic Scheme ...
  • M. Habib, B. Bakhache, D. Battikh and S E. Assad, ...
  • A. Kapasi, S. Kunte and . Sarangi, "Data Hiding In ...
  • S. _ Masud Karim, M. Saifu Rahma and M. Ismail ...
  • G. Manikandan and R. Jeya, "A Steganographic Technique Involving JPEG ...
  • G. Chen, Y. Mao and C. K Chui, "A symmetric ...
  • M. Baptista, "Cryptography with chaos, " Physics Letters A, vol. ...
  • F. Huang and Z. H. Guan, "Cryptosystem using chaotic keys, ...
  • S. Li, X. Mou, Y. Cai, Z. Ji and J. ...
  • N. K. Pareek, V. Patidar and K K. Suda, "Discrete ...
  • T. Xiang, X. Liao, G. Tang, Y. Chen and K. ...
  • A. Senouci and A Boukabou, "Chaotic cryptography using external key, ...
  • D. Xiao, X. Liao and K. W. Wong, "An efficient ...
  • R. C. Gonzalez, R. _ E. Woods and S. _ ...
  • "The University of Southern California, " The USC-SPI Image Database, ...
  • نمایش کامل مراجع