PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Steganography Based Human Skin Using Wavelet Transformation in RGB Image

Wybrane pełne teksty z tego czasopisma
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Steganography is the art and science that enables you to hide the data in certain communication such as (video, Audio, and image). Here it doesn't scramble the data and send it, but we hide it using a color image to hide the data at the Human skin color and doing that using the cropping phrase to get the required area to hide data. In this paper, we will use the Wavelet and slant, let to process the hiding in the blue band of the RGB image and apply the DWT (discrete wavelet transformation) to get the decomposed bounds of the Cover image to use it to hide the data of the (stage) image.
Rocznik
Tom
Strony
84--89
Opis fizyczny
Bibliogr. 6 poz., rys., tab.
Twórcy
autor
  • AL-Mustansiriyah University, College of Science, Dept. Computer Sciences
autor
  • Karbala University, College of Science, Dept. Physics
Bibliografia
  • [1] Biometric Steganographic Technique Using DWT and Encryption, Amritha.G. Meethu Varkey International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 3, March 2013 ISSN: 2277 128X
  • [2] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, ―Biometric inspired digital image Steganographyǁ, in: Proceedings of the 15th Annual IEEE International Conference and Workshops on the Engg.of Computer-Based Systems (ECBS„08), Belfast, 2008, pp. 159-168.
  • [3] ANALYSING SECURE IMAGE SECRET SHARING SCHEMES BASED ON STEGANOGRAPHY Sonali Patil, Kapil Tajane, Janhavi Sirdeshpande, INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Volume 4, Issue 2, March – April (2013), pp. 172-178
  • [4] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Biometric inspired digital image Steganography”, in: Proceedings of the 15th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS‟08), Belfast, 2008,
  • [5] Chang, C. C., Chen, T.S and Chung, L. Z., ”A steganographic method based upon JPEG and quantization table modification,” Information Sciences, vol.[4], pp. 123-138(2002).
  • [6] The Slantlet Transform Ivan W. Selesnick, Member, , IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 47, NO. 5, MAY 1999.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-96bac11b-6140-44ab-8e10-f56df29c2134
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.