سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

A Secure Blind Image Steganography Method Based On Joint LWT-DCT Transformation Using Lattice Vector Quantization

Publish Year: 1394
Type: Conference paper
Language: English
View: 1,041

This Paper With 17 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

NSOECE02_248

Index date: 20 January 2016

A Secure Blind Image Steganography Method Based On Joint LWT-DCT Transformation Using Lattice Vector Quantization abstract

Steganography is the art of hiding sensitive data within a cover image, audio, or text. Impairments of the human visual perception helps the sensitive data become undetectable. Lattice vector quantization is an efficient compression tool. In this paper a new steganography algorithm has been proposed based on lattice vector quantization and Joint LWT-DCT Transformation that embedding in certain coefficient sets of a 3-level lifting wavelet transform of a host image. Then, DCT transform of each selected LWT sub-band is computed and the important data bits are embedded in the middle frequencies coefficients of the corresponding DCT block with using lattice vector quantization. As a result, greatly reduces the likelihood of success of mining hidden.In this method, we make appropriate level of security by using error correction coding Reed-Solomon (63,11) and the results show high security for data hiding while image quality is accepted.

A Secure Blind Image Steganography Method Based On Joint LWT-DCT Transformation Using Lattice Vector Quantization Keywords:

A Secure Blind Image Steganography Method Based On Joint LWT-DCT Transformation Using Lattice Vector Quantization authors

Mohammad Hadi Shirafkan

Dept. of Computer engineering Islamic Azad University, Garmsar, Iran

Ehsan Akhtarkavan

Dept. of Computer engineering Khatam Institute of Higher Education, Tehran, Iran

Javad Vahidi

Dept. of Mathematics University of Science and Technology, Noor, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
M. Heuer, "Similar sublattices and coincidence rotations of the root ...
M. Baake, M. Heuer, and R. V. Moody, "Similar sublattices ...
R. Scharlau, "A structure theorem for weak buildings of spherical ...
Y. Wang, M. T. Orchard, _ Vai shampayan, and A. ...
M. Baake, U. Grimm, M. Heuer, and P. Zeiner, "Coincidence ...
G. Prabakaran and R. Bhavani, "A modified Secure digital image ...
A. Nag, S. Biswas, D. Sarkar, and P. P. Sarkar, ...
P. Nithyanandam, T. Ravichandran, E. Priyadharshini, and N. M. Santron, ...
نمایش کامل مراجع