Back to Search
Start Over
Short Paper: Application of Noisy Attacks on Image Steganography
- Source :
- Networked Systems ISBN: 9783030055288, NETYS
- Publication Year :
- 2019
- Publisher :
- Springer International Publishing, 2019.
-
Abstract
- The data hiding techniques have attracted a lot of attention in recent years and mainly with the intensive growth of multimedia and its possibility for covert communication. Steganography is one of the information hiding methods to confirm the ability of a multimedia carrier to exchange secret information between two end-points so that it is imperceptible, thus avoiding the detection of hidden information. The secret information can be embedded in several multimedia carriers, such as image or audio or video files. It works by embedding the message in a source cover which may make the observer feel it is the source cover itself. The type of multimedia carrier here is an image. However, this technique suffers from the problem of the carrier distortion. In this paper, we investigate the impact of some distortion types on the carrier images and discuss the possibility of using distraction images in steganography to protect the stego-image. Furthermore, we highlight the current challenges of image steganography. The experimentations show very interesting results.
Details
- ISBN :
- 978-3-030-05528-8
- ISBNs :
- 9783030055288
- Database :
- OpenAIRE
- Journal :
- Networked Systems ISBN: 9783030055288, NETYS
- Accession number :
- edsair.doi...........a7a3104b52ef6119a026a1f53e4a7dcd