Paper
19 July 2013 Integrated lossy and lossless compression with LSB Insertion technique in steganography
Yi-Fei Tan, Wooi-Nee Tan, Xiaoning Guo
Author Affiliations +
Proceedings Volume 8878, Fifth International Conference on Digital Image Processing (ICDIP 2013); 88781R (2013) https://doi.org/10.1117/12.2031061
Event: Fifth International Conference on Digital Image Processing, 2013, Beijing, China
Abstract
This paper discusses a data hiding application using steganography. The purpose of this paper is to introduce a two phase steganography application that allows the user to first compress the information into ASCII form using our novel compression technique (compression technique utilizing reference points coding) then embed the information into the carrier using least significant bit (LSB) algorithms. An additional function to this compression method is that it will also allow the user to first choose whether to compress the information in lossy or lossless format before embedding the information into the carrier. The flexibility of this compression technique will allow the user to hide information with a customizable compression phase. By reducing the size for the hidden message, the required bits to embed the message are lessened, and thus the possibility of human visual detection will also be reduced.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yi-Fei Tan, Wooi-Nee Tan, and Xiaoning Guo "Integrated lossy and lossless compression with LSB Insertion technique in steganography", Proc. SPIE 8878, Fifth International Conference on Digital Image Processing (ICDIP 2013), 88781R (19 July 2013); https://doi.org/10.1117/12.2031061
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image compression

Steganography

Data hiding

Image processing

Steganalysis

Visualization

Information security

Back to Top