{"title":"High-capacity steganography","authors":"T. Rabie","doi":"10.1109/CISP.2013.6745285","DOIUrl":null,"url":null,"abstract":"This work builds on a novel framework for image hiding that exploits spatial domain color properties of natural images combined with spectral properties of the Fourier magnitude and phase of these images. The main idea behind this steganography paradigm is that as long as the Fourier phase of an image is maintained intact, the overall appearance of an image remains specious if the Fourier magnitude of the image is slightly modified. In this paper we present improvements in data hiding capacity without compromising the high fidelity, security, and robustness to tampering that the original paradigm developed. Experimental results are presented in this work to demonstrate the effectiveness of these improvements.","PeriodicalId":442320,"journal":{"name":"2013 6th International Congress on Image and Signal Processing (CISP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 6th International Congress on Image and Signal Processing (CISP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISP.2013.6745285","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
This work builds on a novel framework for image hiding that exploits spatial domain color properties of natural images combined with spectral properties of the Fourier magnitude and phase of these images. The main idea behind this steganography paradigm is that as long as the Fourier phase of an image is maintained intact, the overall appearance of an image remains specious if the Fourier magnitude of the image is slightly modified. In this paper we present improvements in data hiding capacity without compromising the high fidelity, security, and robustness to tampering that the original paradigm developed. Experimental results are presented in this work to demonstrate the effectiveness of these improvements.