|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Steganography is the process of hiding a secret message inside another message so that only the sender and the person who is supposed to get it knows it's there. This secret message could be a string of words or even an image. Image steganography is the process of hiding a picture inside another picture. Steganography can be used for a number of good things in the modern world. The goal of this paper is to compare and contrast some existing methods, such as the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), along four dimensions. These are quietness, durability, capacity, and signal-to-noise ratio at the peak (PSNR). Based on what we've found, DWT seems to be the best option. As a bonus, we also did noise analysis on the procedures we just talked about. To Exploring the Capabilities of DWT-DCT Transformation for Red Component Robust Steganography.
Keyword
Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT)
PDF Download (click here)
|
|
|
|
|