Practicing LSB Steganography in PCA Transform Field

Authors

  • Mahdi Koohi Electrical and computer engineering faculty, Tehran University, Tehran, Iran. Author

Keywords:

Steganography, PCA, LSB, Image processing, watermarking, noise

Abstract

PCA conversion defines one main stream and  two sub-streams for the color of homogenous areas. This  subject has led to design some effective algorithms for the  processing of colored images such as coloring, changing the  color, compressing and Steganography. LSB is considered one  of the oldest methods in secret information Steganography in  images. There have been some various designs for this method.  Using a compound method can lead to some new algorithms.  This paper presents a new method for secret information  Steganography.  

Downloads

Download data is not yet available.

References

Bas, Anil, et al. "Fitting a 3D morphable model to edges: A comparison Between hard and soft correspondences." arXiv preprint arXiv: 1602.01125 (2016).

Da-Chun Wu and Wen-Hsiang Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recogn. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003. [3] Niels Provos, "Defending against statistical steganalysis," in SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium. Washington: USENIX Association, 2001, pp. 323-335.

Blanz, Volker, and Thomas Vetter. "A morphable model for the synthesis of 3D faces." Proceedings of the 26th annual conference on Computer graphics and interactive techniques. ACM Press/Addison-Wesley Publishing Co., 1999

Karl Pearson, "On Lines and Planes of Closest Fit to Systems of Points in Space," Philosophical Magazine, vol. 2, no. 6, pp. 559-572, 1991.

Chin-Chen Chang, Ju Yuan Hsiao, and Chi-Shiang Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.

Mohsen Moradi ,” Combining and Steganography of 3D Face Textures”, arXiv:1702.01325v1 [cs.MM] 4 Feb 2017

Andrew Viterbi, "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm," EEE Transactions on Information Theory , vol. 13, no. 2, pp. 260 - 269, Apr 1967.

Shu Lin and Costello Daniel J., Error Control Coding, Second Edition. USA: Prentice-Hall, Inc., 2004. [10] M. Michelson and A. H. Levesque, Error Control Techniques for Digital Communication. New York, USA: John Wiley & Sons, 1985.

Patel, Ankur, and William AP Smith. "3d morphable face models revisited." Computer Vision and Pattern Recognition, 2009. CVPR 2009.IEEE Conference on. IEEE, 2009.

Rich Franzen. (2010, Feb) Kodak true color images.[Online]. http://r0k.us/graphics/kodak/index.html [13] Pearson, Karl. "Principal components analysis." The London, Edinburgh and Dublin Philosophical Magazine and Journal 6.2 (1901): 566.

Jonathon Shlens,”A Tutorial on Principal Component Analysis”. arXiv:1404.1100v1 [cs.LG] 3 Apr 2014 [15] AMRUTHA ASHOK MANVI1, SHARATH YAJI2,” Implementation of Secure Steganographic Scheme Using 3D Models”. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 14 Issue 2 –APRIL 2015.

Downloads

Published

2017-05-09

How to Cite

Practicing LSB Steganography in PCA Transform Field . (2017). International Journal of Innovative Research in Computer Science & Technology, 5(3), 281–286. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13482