A coverless image steganography based on robust image wavelet hashing

[...]the secret data is divided into no overlapping segments. According to the documentation available, there are two types of steganography techniques for images: image steganography with data embedding and coverless image steganography. [...]frequency domain algorithms such as the discrete fourier...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Telkomnika 2022-12, Vol.20 (6), p.1317-1325
Hauptverfasser: Karim, Nadia A., Ali, Suhad A., Jawad, Majid Jabbar
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1325
container_issue 6
container_start_page 1317
container_title Telkomnika
container_volume 20
creator Karim, Nadia A.
Ali, Suhad A.
Jawad, Majid Jabbar
description [...]the secret data is divided into no overlapping segments. According to the documentation available, there are two types of steganography techniques for images: image steganography with data embedding and coverless image steganography. [...]frequency domain algorithms such as the discrete fourier transform (DFT) [11], discrete wavelet transform (DWT) [12], discrete cosine transform (DCT) [13] and integer wavelet transform (IWT) [14] have been presented that use modified coefficients for data embedding. According to experimental results, this method improves the retrieval accuracy and capacity [24].
doi_str_mv 10.12928/telkomnika.v20i6.23596
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2724915362</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2724915362</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-b03e50ea0662e8564fa258779cf02a163e55fe9cc735a3e351a6047c70e32d1c3</originalsourceid><addsrcrecordid>eNpFkMFqAjEQhkNpoWJ9hi70vHYyMcnmKGJbQeilPYcYZ9fVdWOT1eLbd1GhA8Mc_o-Z4WPsmcOYo8HitaNmF_ZtvXPjE0KtxiikUXdsgAIwN2jEPRtwZUTeNzyyUUpb6EsDSlMM2Hya-XCi2FBKWb13FWWpo8q1oYrusDlnK5donYU2i2F1TN2N-XUnaqjLNi5t6rZ6Yg-laxKNbnPIvt_mX7OPfPn5vphNl7lHgC5fgSAJ5EAppEKqSelQFlobXwI6rvpUlmS810I6QUJyp2CivQYSuOZeDNnLde8hhp8jpc5uwzG2_UmLGieGS6Gwp_SV8jGkFKm0h9i_Hc-Wg71os__a7EWbvWgTfyfuZBY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2724915362</pqid></control><display><type>article</type><title>A coverless image steganography based on robust image wavelet hashing</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Karim, Nadia A. ; Ali, Suhad A. ; Jawad, Majid Jabbar</creator><creatorcontrib>Karim, Nadia A. ; Ali, Suhad A. ; Jawad, Majid Jabbar</creatorcontrib><description>[...]the secret data is divided into no overlapping segments. According to the documentation available, there are two types of steganography techniques for images: image steganography with data embedding and coverless image steganography. [...]frequency domain algorithms such as the discrete fourier transform (DFT) [11], discrete wavelet transform (DWT) [12], discrete cosine transform (DCT) [13] and integer wavelet transform (IWT) [14] have been presented that use modified coefficients for data embedding. According to experimental results, this method improves the retrieval accuracy and capacity [24].</description><identifier>ISSN: 1693-6930</identifier><identifier>EISSN: 2302-9293</identifier><identifier>DOI: 10.12928/telkomnika.v20i6.23596</identifier><language>eng</language><publisher>Yogyakarta: Ahmad Dahlan University</publisher><subject>Algorithms ; Communication ; Deep learning ; Discrete cosine transform ; Discrete Wavelet Transform ; Embedding ; Fourier transforms ; Image databases ; Methods ; Multimedia ; Receivers &amp; amplifiers ; Semantics ; Steganography ; Wavelet transforms</subject><ispartof>Telkomnika, 2022-12, Vol.20 (6), p.1317-1325</ispartof><rights>2022. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c200t-b03e50ea0662e8564fa258779cf02a163e55fe9cc735a3e351a6047c70e32d1c3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Karim, Nadia A.</creatorcontrib><creatorcontrib>Ali, Suhad A.</creatorcontrib><creatorcontrib>Jawad, Majid Jabbar</creatorcontrib><title>A coverless image steganography based on robust image wavelet hashing</title><title>Telkomnika</title><description>[...]the secret data is divided into no overlapping segments. According to the documentation available, there are two types of steganography techniques for images: image steganography with data embedding and coverless image steganography. [...]frequency domain algorithms such as the discrete fourier transform (DFT) [11], discrete wavelet transform (DWT) [12], discrete cosine transform (DCT) [13] and integer wavelet transform (IWT) [14] have been presented that use modified coefficients for data embedding. According to experimental results, this method improves the retrieval accuracy and capacity [24].</description><subject>Algorithms</subject><subject>Communication</subject><subject>Deep learning</subject><subject>Discrete cosine transform</subject><subject>Discrete Wavelet Transform</subject><subject>Embedding</subject><subject>Fourier transforms</subject><subject>Image databases</subject><subject>Methods</subject><subject>Multimedia</subject><subject>Receivers &amp; amplifiers</subject><subject>Semantics</subject><subject>Steganography</subject><subject>Wavelet transforms</subject><issn>1693-6930</issn><issn>2302-9293</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpFkMFqAjEQhkNpoWJ9hi70vHYyMcnmKGJbQeilPYcYZ9fVdWOT1eLbd1GhA8Mc_o-Z4WPsmcOYo8HitaNmF_ZtvXPjE0KtxiikUXdsgAIwN2jEPRtwZUTeNzyyUUpb6EsDSlMM2Hya-XCi2FBKWb13FWWpo8q1oYrusDlnK5donYU2i2F1TN2N-XUnaqjLNi5t6rZ6Yg-laxKNbnPIvt_mX7OPfPn5vphNl7lHgC5fgSAJ5EAppEKqSelQFlobXwI6rvpUlmS810I6QUJyp2CivQYSuOZeDNnLde8hhp8jpc5uwzG2_UmLGieGS6Gwp_SV8jGkFKm0h9i_Hc-Wg71os__a7EWbvWgTfyfuZBY</recordid><startdate>20221201</startdate><enddate>20221201</enddate><creator>Karim, Nadia A.</creator><creator>Ali, Suhad A.</creator><creator>Jawad, Majid Jabbar</creator><general>Ahmad Dahlan University</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20221201</creationdate><title>A coverless image steganography based on robust image wavelet hashing</title><author>Karim, Nadia A. ; Ali, Suhad A. ; Jawad, Majid Jabbar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-b03e50ea0662e8564fa258779cf02a163e55fe9cc735a3e351a6047c70e32d1c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Communication</topic><topic>Deep learning</topic><topic>Discrete cosine transform</topic><topic>Discrete Wavelet Transform</topic><topic>Embedding</topic><topic>Fourier transforms</topic><topic>Image databases</topic><topic>Methods</topic><topic>Multimedia</topic><topic>Receivers &amp; amplifiers</topic><topic>Semantics</topic><topic>Steganography</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Karim, Nadia A.</creatorcontrib><creatorcontrib>Ali, Suhad A.</creatorcontrib><creatorcontrib>Jawad, Majid Jabbar</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>East &amp; South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Telkomnika</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Karim, Nadia A.</au><au>Ali, Suhad A.</au><au>Jawad, Majid Jabbar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A coverless image steganography based on robust image wavelet hashing</atitle><jtitle>Telkomnika</jtitle><date>2022-12-01</date><risdate>2022</risdate><volume>20</volume><issue>6</issue><spage>1317</spage><epage>1325</epage><pages>1317-1325</pages><issn>1693-6930</issn><eissn>2302-9293</eissn><abstract>[...]the secret data is divided into no overlapping segments. According to the documentation available, there are two types of steganography techniques for images: image steganography with data embedding and coverless image steganography. [...]frequency domain algorithms such as the discrete fourier transform (DFT) [11], discrete wavelet transform (DWT) [12], discrete cosine transform (DCT) [13] and integer wavelet transform (IWT) [14] have been presented that use modified coefficients for data embedding. According to experimental results, this method improves the retrieval accuracy and capacity [24].</abstract><cop>Yogyakarta</cop><pub>Ahmad Dahlan University</pub><doi>10.12928/telkomnika.v20i6.23596</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1693-6930
ispartof Telkomnika, 2022-12, Vol.20 (6), p.1317-1325
issn 1693-6930
2302-9293
language eng
recordid cdi_proquest_journals_2724915362
source EZB-FREE-00999 freely available EZB journals
subjects Algorithms
Communication
Deep learning
Discrete cosine transform
Discrete Wavelet Transform
Embedding
Fourier transforms
Image databases
Methods
Multimedia
Receivers & amplifiers
Semantics
Steganography
Wavelet transforms
title A coverless image steganography based on robust image wavelet hashing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T00%3A23%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20coverless%20image%20steganography%20based%20on%20robust%20image%20wavelet%20hashing&rft.jtitle=Telkomnika&rft.au=Karim,%20Nadia%20A.&rft.date=2022-12-01&rft.volume=20&rft.issue=6&rft.spage=1317&rft.epage=1325&rft.pages=1317-1325&rft.issn=1693-6930&rft.eissn=2302-9293&rft_id=info:doi/10.12928/telkomnika.v20i6.23596&rft_dat=%3Cproquest_cross%3E2724915362%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2724915362&rft_id=info:pmid/&rfr_iscdi=true