Vous êtes sur la page 1sur 2

Information hiding in two domains Characteristics: good visual/statistical imperceptibility (Security), sufficient payload (Data rate).

.Secrete message can be encrypted b4 embedding double security Invisible water marking subset of steganography 1) Spatial Domain 2) Transform Domain Robustness. - Higher Capacity and lower Robustness High embedding Capacity - DCT, FT, Wavelet Robust against Multimedia Processing High

Common Methods of Steganography: 1) LSB Insertion Method. 2) Masking and filtering. 3) Transform Techniques Wavelet Transformation: 1) Wavelet Decomp results in band coefficients, namely, approximate band (LL), Vertical Band (LH), Horizontal band (HL), and diagonal detail band (HH). 2) The approximation band consists of low frequency wavelet coefficients, which contain significant part of the spatial domain image. 3) The other bands also called as detail bands consists of high frequency coefficients, which contain the edge details of the spatial domain image. 4) It is therefore expected that use of the DWT will allow independent processing of the resulting components without significant perceptible interaction between them, and hence makes the process imperceptibility marking more effective. LSB Techniques: LSB replacement, which simply replaces LSB bits of cover image with secret bits, and LSB matching where pixels are randomly incremented or decremented. PLIP: Parametric Logarithmic Image Processing Scrambled Secret Image and Cover Image as input Output Stego Image. Steganalysis: Steganalysis methods attempt to detect Stego-image and extract it. Inserting secret bits in image changes some statistics of image, Key metric for steg analysis. Lower the change more robust and detection get difficult. larger payload embedded in a cover, the more detectable artifacts would be introduced into the stego. Trade off --> High embedding rate (More the secret image to be embedded algorithm should still remain intact) Lower changes in Cover Image- Eventually Steganalysis difficult- Robust Algorithm Transform or Spatial domain so hacking or Tampering of cover image still recovers secret image -Imperceptibility Stego Image should occupy less space Highly compressed

Scope of Enhancements as far I as guessed:

1) High Capacity embedding -- Embedding more quantity of information. 2) Choice of pixels of the Cover so that tampering doesnt cause problems in image retrieval (Secret Image). 3) Comparison between Transform Domain and Spatial Domain Approach. 4) Possibility of compression either the stego image or the secret image. 5) Possible Options of Stego Key (Not sure thou Aishu Discovery !!!) 6) Could these be related to Steganalysis

Vous aimerez peut-être aussi