{"title":"一种压缩LSB隐写方法","authors":"N. Akhtar, Vasim Ahamad, Hira Javed","doi":"10.1109/CIACT.2017.7977371","DOIUrl":null,"url":null,"abstract":"A least significant bit (LSB) Steganography is mainly characterized by its hiding capacity and imperceptibility which is measured by Peak Signal to Noise Ratio (PSNR). There is a trade-off between these two factors. In this paper, an improved LSB Steganography which uses modulus function for data hiding method has been proposed and implemented which is better than previous methods in imperceptibility keeping the hiding capacity same. The proposed Steganography method breaks the secret data into two components. Each component is hidden into cover image pixels using modulo function. Repetition in secret data component is also considered. Results show that the proposed method is better than existing methods unless there is high randomness in secret data.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"A compressed LSB steganography method\",\"authors\":\"N. Akhtar, Vasim Ahamad, Hira Javed\",\"doi\":\"10.1109/CIACT.2017.7977371\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A least significant bit (LSB) Steganography is mainly characterized by its hiding capacity and imperceptibility which is measured by Peak Signal to Noise Ratio (PSNR). There is a trade-off between these two factors. In this paper, an improved LSB Steganography which uses modulus function for data hiding method has been proposed and implemented which is better than previous methods in imperceptibility keeping the hiding capacity same. The proposed Steganography method breaks the secret data into two components. Each component is hidden into cover image pixels using modulo function. Repetition in secret data component is also considered. Results show that the proposed method is better than existing methods unless there is high randomness in secret data.\",\"PeriodicalId\":218079,\"journal\":{\"name\":\"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)\",\"volume\":\"308 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIACT.2017.7977371\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIACT.2017.7977371","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A least significant bit (LSB) Steganography is mainly characterized by its hiding capacity and imperceptibility which is measured by Peak Signal to Noise Ratio (PSNR). There is a trade-off between these two factors. In this paper, an improved LSB Steganography which uses modulus function for data hiding method has been proposed and implemented which is better than previous methods in imperceptibility keeping the hiding capacity same. The proposed Steganography method breaks the secret data into two components. Each component is hidden into cover image pixels using modulo function. Repetition in secret data component is also considered. Results show that the proposed method is better than existing methods unless there is high randomness in secret data.