Abstract

Steganography is a modern approach to protect classified data against malicious attacks and misuse. Presented, accordingly, in this paper is a novel method for steganographic embedding of information. A template matrix is used for screening the original message embedded in an image. The efficiency of the steganographic embedding depends on the length of the message. The particular dependency is, therefore, the primary focus of the proposed work. The end results of the experiment were extremely satisfactory with the percentage of successfully retrieved messages being more than 90%, and the size of the processed images with embedded messages being fully acceptable and capable of being used in a communication environment.

Highlights

  • Steganography deals with composing hidden messages so that only the sender and recipient know that the message even exists

  • In this paper is a novel method for steganographic embedding of information

  • A template matrix is used for screening the original message embedded in an image

Read more

Summary

Introduction

Steganography deals with composing hidden messages so that only the sender and recipient know that the message even exists. Steganography has been used since ancient times and these ancient methods are called physical steganography. The emphasis of the present study is on steganography with images or hiding useful information by embedding it in the image. In this model, the image is a carrier of information. In the style of steganography, it is important that the changes made to the image carrier, after the incorporation of the useful information, do not lead to its noticeable change, i.e. the original image and the modified steganographic one should have almost no visual differences. Paper of a template matrix in accordance with the primary purpose of the study to explore the influence of the template matrix on the performance of the steganographic processes

Bit pixel representation
Process of embedding a message into an image
Experimental results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.