Reversible image steganography using ROI & RONI
Reversible steganography allows to recover of original image without any distortion when the embedded secret message has extracted. This research was tested with four different image and one storage image. The sample image is divided into three type of region which are Region of Interest (ROI), Regi...
| Main Author: | Lim, Jee Chao |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/27103/ http://umpir.ump.edu.my/id/eprint/27103/1/Reversible%20image%20steganography%20using%20ROI%20%26%20RONI.pdf |
Similar Items
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Medical image : ROI and RONI definition using fuzzy logic
by: Song, Chia Yeh
Published: (2014)
by: Song, Chia Yeh
Published: (2014)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014)
by: Phang, She Chin
Published: (2014)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images
by: Hui, Liang Khor, et al.
Published: (2017)
by: Hui, Liang Khor, et al.
Published: (2017)
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)
by: Ng, Ke-Huey, et al.
Published: (2018)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Breast Ultrasound Automated ROI Segmentation with Region Growing
by: Lee, Lay-Khoon, et al.
Published: (2015)
by: Lee, Lay-Khoon, et al.
Published: (2015)
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013)
by: Liew, Siau-Chuin, et al.
Published: (2013)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Prototype development of VOIP steganography
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
by: Al-Othmani, Abdulaleem Zaid Mohammed
Published: (2009)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010)
by: Zamani, Mazdak
Published: (2010)
Steganography based on utilizing more surrounding pixels
by: Afrakhteh, Masoud
Published: (2010)
by: Afrakhteh, Masoud
Published: (2010)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
A genetic-algorithm-based approach for audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
An improved rdwt-based image steganography scheme using qr decomposition and human visual system
by: Ng, Ke Huey
Published: (2021)
by: Ng, Ke Huey
Published: (2021)
Real time vein visualization using near-infrared imaging
by: May, Y. H., et al.
Published: (2020)
by: May, Y. H., et al.
Published: (2020)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
Dual image watermarking based on NSST-LWT-DCT for color image
by: Avivah, Siti Nur, et al.
Published: (2024)
by: Avivah, Siti Nur, et al.
Published: (2024)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
An improved image compression technique using large adaptive DCT psychovisual thresholds
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Web-based question bank / Chao Ai Ling
by: Chao, Ai Ling
Published: (2004)
by: Chao, Ai Ling
Published: (2004)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Similar Items
-
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005) -
Medical image : ROI and RONI definition using fuzzy logic
by: Song, Chia Yeh
Published: (2014) -
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013) -
Impact of image perceptibility in steganography
by: Phang, She Chin
Published: (2014) -
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)