咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Coverless Image Steganography ... 收藏

Coverless Image Steganography Based on Jigsaw Puzzle Image Generation

作     者:Al Hussien Seddik Saad M.S.Mohamed E.H.Hafez 

作者机构:Department of Computer ScienceFaculty of ScienceMinia UniversityMinya61519Egypt Department of MathematicsCollege of ScienceTaif UniversityTaif21944Saudi Arabia Department of MathematicsFaculty of ScienceAl-Azher UniversityNasr City11884Egypt Department of MathematicsFaculty of ScienceHelwan UniversityCairoEgypt 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2021年第67卷第5期

页      面:2077-2091页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:funded by“Taif University Researchers Supporting Project No.(TURSP-2020/160) Taif University Taif Saudi Arabia.” 

主  题:Coverless information hiding Jigsaw puzzle image image steganography data hiding 

摘      要:Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego ***,the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload.A coverless data hiding concept is proposed to solve this *** does not mean that cover is not required,or the payload can be transmitted without a ***,the payload is embedded by cover generation or a secret message mapping between the cover file and the *** this paper,a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret ***,the image is divided into equal rows then further divided into equal columns,creating blocks(i.e.,sub-images).Then,according to secret message bits and a proposed mapping function,each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle *** that,the generated jigsaw puzzle image is sent to the *** results and analysis show a good performance in the hiding capacity,security,and robustness compared with existing coverless image steganography methods.

读者评论 与其他读者分享你的观点