Practicing LSB Steganography in PCA Transform Field
Keywords:
Steganography, PCA, LSB, Image processing, watermarking, noiseAbstract
PCA conversion defines one main stream and two sub-streams for the color of homogenous areas. This subject has led to design some effective algorithms for the processing of colored images such as coloring, changing the color, compressing and Steganography. LSB is considered one of the oldest methods in secret information Steganography in images. There have been some various designs for this method. Using a compound method can lead to some new algorithms. This paper presents a new method for secret information Steganography.
Downloads
References
Bas, Anil, et al. "Fitting a 3D morphable model to edges: A comparison Between hard and soft correspondences." arXiv preprint arXiv: 1602.01125 (2016).
Da-Chun Wu and Wen-Hsiang Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recogn. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003. [3] Niels Provos, "Defending against statistical steganalysis," in SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium. Washington: USENIX Association, 2001, pp. 323-335.
Blanz, Volker, and Thomas Vetter. "A morphable model for the synthesis of 3D faces." Proceedings of the 26th annual conference on Computer graphics and interactive techniques. ACM Press/Addison-Wesley Publishing Co., 1999
Karl Pearson, "On Lines and Planes of Closest Fit to Systems of Points in Space," Philosophical Magazine, vol. 2, no. 6, pp. 559-572, 1991.
Chin-Chen Chang, Ju Yuan Hsiao, and Chi-Shiang Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.
Mohsen Moradi ,” Combining and Steganography of 3D Face Textures”, arXiv:1702.01325v1 [cs.MM] 4 Feb 2017
Andrew Viterbi, "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm," EEE Transactions on Information Theory , vol. 13, no. 2, pp. 260 - 269, Apr 1967.
Shu Lin and Costello Daniel J., Error Control Coding, Second Edition. USA: Prentice-Hall, Inc., 2004. [10] M. Michelson and A. H. Levesque, Error Control Techniques for Digital Communication. New York, USA: John Wiley & Sons, 1985.
Patel, Ankur, and William AP Smith. "3d morphable face models revisited." Computer Vision and Pattern Recognition, 2009. CVPR 2009.IEEE Conference on. IEEE, 2009.
Rich Franzen. (2010, Feb) Kodak true color images.[Online]. http://r0k.us/graphics/kodak/index.html [13] Pearson, Karl. "Principal components analysis." The London, Edinburgh and Dublin Philosophical Magazine and Journal 6.2 (1901): 566.
Jonathon Shlens,”A Tutorial on Principal Component Analysis”. arXiv:1404.1100v1 [cs.LG] 3 Apr 2014 [15] AMRUTHA ASHOK MANVI1, SHARATH YAJI2,” Implementation of Secure Steganographic Scheme Using 3D Models”. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 14 Issue 2 –APRIL 2015.