Padmaja Grandhe, A. Reddy, Kavyasri Chillapalli, Kavya Koppera, Manasa Thambabathula, L. P. Reddy Surasani
{"title":"用隐写分析提高图像隐写的隐藏能力","authors":"Padmaja Grandhe, A. Reddy, Kavyasri Chillapalli, Kavya Koppera, Manasa Thambabathula, L. P. Reddy Surasani","doi":"10.1109/ICICACS57338.2023.10100146","DOIUrl":null,"url":null,"abstract":"Communicating online without fearing third-party interventions is becoming a challenge in the modern world. Especially the sectors like the military, and government organizations or private companies sharing sensitive information. They invest a lot of effort and cost into obtaining the advancement of safe communication techniques. Image processing encryption techniques using various algorithms promote security over communication channels and using different analysis methods make the tool stand out in providing security to the information. In today's world, there are various steganographic mechanisms that convert the secret message into stego medium and send it across various communication channels. Using algorithms like Blind Hide promotes the security of the message along with using multiple analysis methods that will further improve the tool in giving out information of encoded accuracy, size of stego of the secret message. The aim is to generate a tool that will give out a benchmark value of how precisely the message is stored in the cover file. Using Stego and bulk analysis the information about the presence of the stego medium in the message can be known to the user. All these analysis methods make the tool more enhanced and secure.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Improving The Hiding Capacity of Image Steganography with Stego-Analysis\",\"authors\":\"Padmaja Grandhe, A. Reddy, Kavyasri Chillapalli, Kavya Koppera, Manasa Thambabathula, L. P. Reddy Surasani\",\"doi\":\"10.1109/ICICACS57338.2023.10100146\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Communicating online without fearing third-party interventions is becoming a challenge in the modern world. Especially the sectors like the military, and government organizations or private companies sharing sensitive information. They invest a lot of effort and cost into obtaining the advancement of safe communication techniques. Image processing encryption techniques using various algorithms promote security over communication channels and using different analysis methods make the tool stand out in providing security to the information. In today's world, there are various steganographic mechanisms that convert the secret message into stego medium and send it across various communication channels. Using algorithms like Blind Hide promotes the security of the message along with using multiple analysis methods that will further improve the tool in giving out information of encoded accuracy, size of stego of the secret message. The aim is to generate a tool that will give out a benchmark value of how precisely the message is stored in the cover file. Using Stego and bulk analysis the information about the presence of the stego medium in the message can be known to the user. All these analysis methods make the tool more enhanced and secure.\",\"PeriodicalId\":274807,\"journal\":{\"name\":\"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)\",\"volume\":\"2020 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICACS57338.2023.10100146\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICACS57338.2023.10100146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improving The Hiding Capacity of Image Steganography with Stego-Analysis
Communicating online without fearing third-party interventions is becoming a challenge in the modern world. Especially the sectors like the military, and government organizations or private companies sharing sensitive information. They invest a lot of effort and cost into obtaining the advancement of safe communication techniques. Image processing encryption techniques using various algorithms promote security over communication channels and using different analysis methods make the tool stand out in providing security to the information. In today's world, there are various steganographic mechanisms that convert the secret message into stego medium and send it across various communication channels. Using algorithms like Blind Hide promotes the security of the message along with using multiple analysis methods that will further improve the tool in giving out information of encoded accuracy, size of stego of the secret message. The aim is to generate a tool that will give out a benchmark value of how precisely the message is stored in the cover file. Using Stego and bulk analysis the information about the presence of the stego medium in the message can be known to the user. All these analysis methods make the tool more enhanced and secure.