{"title":"基于LSB的PN序列和GCD变换图像隐写","authors":"R. K. Pathak, S. Meena","doi":"10.1109/ICCIC.2015.7435692","DOIUrl":null,"url":null,"abstract":"This paper has been proposed for the image steganography. It is based on a modification of LSB (least significant bit) of pixels and this modification is the replacement of LSB bits of the cover image (CI) pixels that carries the most significant bits (MSB) of data image (DI). This makes the algorithm modest. In steganography of image, security is also a major concern. Here, key based PN (Pseudo Number) sequence is generated. It is used to provide security to algorithm against the stegano-analytic attack. The algorithm also has been improved to detect and locate tampering done by malicious attackers. This is obtained by conversion of image into a fixed point image using GCD (Gaussian convolution and de-convolution) transform.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"LSB based image steganography using PN sequence & GCD transform\",\"authors\":\"R. K. Pathak, S. Meena\",\"doi\":\"10.1109/ICCIC.2015.7435692\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper has been proposed for the image steganography. It is based on a modification of LSB (least significant bit) of pixels and this modification is the replacement of LSB bits of the cover image (CI) pixels that carries the most significant bits (MSB) of data image (DI). This makes the algorithm modest. In steganography of image, security is also a major concern. Here, key based PN (Pseudo Number) sequence is generated. It is used to provide security to algorithm against the stegano-analytic attack. The algorithm also has been improved to detect and locate tampering done by malicious attackers. This is obtained by conversion of image into a fixed point image using GCD (Gaussian convolution and de-convolution) transform.\",\"PeriodicalId\":276894,\"journal\":{\"name\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"volume\":\"221 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIC.2015.7435692\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2015.7435692","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
LSB based image steganography using PN sequence & GCD transform
This paper has been proposed for the image steganography. It is based on a modification of LSB (least significant bit) of pixels and this modification is the replacement of LSB bits of the cover image (CI) pixels that carries the most significant bits (MSB) of data image (DI). This makes the algorithm modest. In steganography of image, security is also a major concern. Here, key based PN (Pseudo Number) sequence is generated. It is used to provide security to algorithm against the stegano-analytic attack. The algorithm also has been improved to detect and locate tampering done by malicious attackers. This is obtained by conversion of image into a fixed point image using GCD (Gaussian convolution and de-convolution) transform.