Steganography Techniques for Digital Images by Abid Yahya
Author:Abid Yahya
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
3.1 Introduction
This section debates the main structure of the proposed scheme and examines the theoretical aspects of the CR-BIS in detail. The chapter also explains the suggested framework which links three components, namely encryption, characteristic region detection, and steganography. In this chapter, the concept of characteristic region embedding is introduced into information-hiding in general and mainly to steganography. The characteristic regions in the image, rather than the whole image or certain locations in the image, are used to conceal secret information. Such a method will increase the security of the embedding process. To detect the characteristic regions, SURF technique is employed in the proposed algorithm. Those characteristic regions are described as robust to various transformations, such as rotation, scaling, cropping, and affine transformations, which enables them to resist possible attacks. This condition implies that those regions can be detected correctly even after applying attacks. Subsequently, the stego-system performance improved significantly against steganalysis attacks and data loss (Hamid et al., 2012a, 2013b; Abdul-mahdi et al., 2013).
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Computer Vision & Pattern Recognition | Expert Systems |
Intelligence & Semantics | Machine Theory |
Natural Language Processing | Neural Networks |
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Test-Driven Development with Java by Alan Mellor(6794)
Data Augmentation with Python by Duc Haba(6712)
Principles of Data Fabric by Sonia Mezzetta(6456)
Learn Blender Simulations the Right Way by Stephen Pearson(6362)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6230)
Hadoop in Practice by Alex Holmes(5965)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5813)
RPA Solution Architect's Handbook by Sachin Sahgal(5630)
Big Data Analysis with Python by Ivan Marin(5397)
The Infinite Retina by Robert Scoble Irena Cronin(5317)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5158)
Pretrain Vision and Large Language Models in Python by Emily Webber(4362)
Infrastructure as Code for Beginners by Russ McKendrick(4129)
Functional Programming in JavaScript by Mantyla Dan(4044)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3842)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3646)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3617)
