Access Restriction

Author Pradhan, Anita ♦ Sharma, D. S. ♦ Swain, Gandharba
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Three Four Neighbor Pixel ♦ Embedding Decision ♦ Neighbor Method ♦ Theoretical Study ♦ First Method ♦ Image Steganography Method ♦ Variable Rate ♦ Message Extraction Process ♦ Original Image ♦ Experimental Result
Abstract In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedding decisions. In three neighbor method the three neighboring pixels such as upper, left and right are exploited to take embedding decisions. In four neighbor method the four neighboring pixels such as upper, left, right and bottom are exploited to take embedding decisions. The message extraction process is very simple and does not require any knowledge of the original image. The experimental results show that the distortion is less in two neighbor method as compared to the other two methods. But the theoretical studies reveal that the capacity in four neighbor method is more as compared to two and three neighbor methods.
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article