{"title":"一种新的隐写算法,将灰度BMP图像隐藏在两幅灰度BMP图像中,实现双重保密","authors":"F. Jassim","doi":"10.1109/NCIA.2013.6725327","DOIUrl":null,"url":null,"abstract":"Recent researches in steganography get used to hire one cover image as a host image. In this paper, a novel method was proposed to use two cover images as host images with one secret (stego) image. The main principle of using two host images is to increase the security in the receiver side when sending each host image alone in different times. The first phase starts with sending the first cover image alone with special stego key. The second phase, is to sent the other cover image with different stego key. The dispatched images are send without introducing noticeable artifacts. Actually, this process will make the way difficult and arduous for the adversary. The experiments demonstrate that the proposed method can provide excellent perceptual quality of the reconstructed secret image. The performance metrics have proven that the reconstructed secret image has high PSNR value with very small MSE.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A novel steganography algorithm to hide a grayscale BMP image in two grayscale BMP images for dual secrecy\",\"authors\":\"F. Jassim\",\"doi\":\"10.1109/NCIA.2013.6725327\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent researches in steganography get used to hire one cover image as a host image. In this paper, a novel method was proposed to use two cover images as host images with one secret (stego) image. The main principle of using two host images is to increase the security in the receiver side when sending each host image alone in different times. The first phase starts with sending the first cover image alone with special stego key. The second phase, is to sent the other cover image with different stego key. The dispatched images are send without introducing noticeable artifacts. Actually, this process will make the way difficult and arduous for the adversary. The experiments demonstrate that the proposed method can provide excellent perceptual quality of the reconstructed secret image. The performance metrics have proven that the reconstructed secret image has high PSNR value with very small MSE.\",\"PeriodicalId\":222016,\"journal\":{\"name\":\"2013 2nd National Conference on Information Assurance (NCIA)\",\"volume\":\"90 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 2nd National Conference on Information Assurance (NCIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIA.2013.6725327\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 2nd National Conference on Information Assurance (NCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIA.2013.6725327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel steganography algorithm to hide a grayscale BMP image in two grayscale BMP images for dual secrecy
Recent researches in steganography get used to hire one cover image as a host image. In this paper, a novel method was proposed to use two cover images as host images with one secret (stego) image. The main principle of using two host images is to increase the security in the receiver side when sending each host image alone in different times. The first phase starts with sending the first cover image alone with special stego key. The second phase, is to sent the other cover image with different stego key. The dispatched images are send without introducing noticeable artifacts. Actually, this process will make the way difficult and arduous for the adversary. The experiments demonstrate that the proposed method can provide excellent perceptual quality of the reconstructed secret image. The performance metrics have proven that the reconstructed secret image has high PSNR value with very small MSE.