• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 10 (7), 2011
  3. 1285-1294
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2011 | Volume: 10 | Issue: 7 | Page No.: 1285-1294
DOI: 10.3923/itj.2011.1285.1294

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 282

Authors


Omid Zanganeh

Country: Malaysia

Subariah Ibrahim

Country: Malaysia

Keywords


  • substitution technique
  • Information security
  • image steganography
  • steganalysis
  • data hiding
Research Article

Adaptive Image Steganography Based on Optimal Embedding and Robust Against Chi-square Attack

Omid Zanganeh and Subariah Ibrahim
A real-life requirement motivated this case study of secure covert communication. Steganography is a technique used to transfer hidden information in an imperceptible manner. We proposed a novel approach of substitution technique of image steganography. The proposed method is flexible on size of secret message and allows us to embed a large amount of secret messages as well as maintaining good visual quality of stego-image. Using this method, message bits are embedded into uncertain and higher LSB layers, resulting in increased imperceptible and robustness of stego-image. Results show that the proposed algorithm provides large embedding capacity without losing the imperceptibility of the stego-image. The algorithm is also robust against Chi-square attack.
PDF Fulltext XML References Citation

How to cite this article

Omid Zanganeh and Subariah Ibrahim, 2011. Adaptive Image Steganography Based on Optimal Embedding and Robust Against Chi-square Attack. Information Technology Journal, 10: 1285-1294.

DOI: 10.3923/itj.2011.1285.1294

URL: https://scialert.net/abstract/?doi=itj.2011.1285.1294

Related Articles

High Capacity Triple Plane Embedding: A Colour Stego
A New Steganography Algorithm against Chi Square Attack
Rubik’s Cube: A Way for Random Image Steganography
Kubera Kolam: A Way for Random Image Steganography
High Performance Pixel indicator For Colour Image Steganography
High Quality Steganography Model with Attacks Detection
Feature Selection for Image Steganalysis using Hybrid Genetic Algorithm
Hiding Data in Video File: An Overview
On the Capacity and Security of Steganography Approaches: An Overview
An Overview on Hiding Information Technique in Images

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved