Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Using of JPEG image as a cover media for text hiding

View through CrossRef
This paper, will overview the use of data hiding techniques in JPEG digital image file format. In particular, will describe how one can use Steganography to hide information in a JPEG digital image. This research will review of hiding data by using Least Significant Bit (LSB) as a method, and hiding a text (document) in a JPEG image as a media cover. This paper was implemented by using matlab to complete hiding data. Data hiding is a technique that is used to embed secret information into a cover media. However, the transmitted images may be compressed or not. When it is transmitted, an errors transmitting may occur. If such errors occurred, the receiver cannot extract the information correctly from the cover_image. Digital media have been massively produced, easily manipulated, and swiftly transmitted to almost anywhere in the world at anytime.
Title: Using of JPEG image as a cover media for text hiding
Description:
This paper, will overview the use of data hiding techniques in JPEG digital image file format.
In particular, will describe how one can use Steganography to hide information in a JPEG digital image.
This research will review of hiding data by using Least Significant Bit (LSB) as a method, and hiding a text (document) in a JPEG image as a media cover.
This paper was implemented by using matlab to complete hiding data.
Data hiding is a technique that is used to embed secret information into a cover media.
However, the transmitted images may be compressed or not.
When it is transmitted, an errors transmitting may occur.
If such errors occurred, the receiver cannot extract the information correctly from the cover_image.
Digital media have been massively produced, easily manipulated, and swiftly transmitted to almost anywhere in the world at anytime.

Related Results

Image Forgery Detection and Localization using Modified JPEG Ghost
Image Forgery Detection and Localization using Modified JPEG Ghost
Authenticity of an image taken digitally suffers severe threats as a result of increase in various powerful digital image editing tools. These tools modifies the image contents wit...
IMPLEMENTASI STEGANOGRAFI TEXT TO IMAGE MENGGUNAKAN METODE ONE BIT LEAST SIGNIFICANT BIT BERBASIS ANDROID
IMPLEMENTASI STEGANOGRAFI TEXT TO IMAGE MENGGUNAKAN METODE ONE BIT LEAST SIGNIFICANT BIT BERBASIS ANDROID
Abstrak - Informasi merupakan hal yang sangat penting dan berharga, dewasa ini informasi sering dipertukarkan melalui internet. Kemajuan teknologi smartphone terutama smartphone An...
E-Press and Oppress
E-Press and Oppress
From elephants to ABBA fans, silicon to hormone, the following discussion uses a new research method to look at printed text, motion pictures and a te...
APPLICATION OF CUTTER–JORDAN–BOSSEN METHOD FOR DATA HIDING IN THE IMAGE SPATIAL AREA
APPLICATION OF CUTTER–JORDAN–BOSSEN METHOD FOR DATA HIDING IN THE IMAGE SPATIAL AREA
The article deals with the main methods of digital steganography and presents a classification scheme. Special attention is paid to Cutter–Jordan–Bossen method for hiding data in t...
Double Exposure
Double Exposure
I. Happy Endings Chaplin’s Modern Times features one of the most subtly strange endings in Hollywood history. It concludes with the Tramp (Chaplin) and the Gamin (Paulette Godda...
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
<span style="font-size:11pt"><span style="background:#f9f9f4"><span style="line-height:normal"><span style="font-family:Calibri,sans-serif"><b><spa...
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used...
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among...

Back to Top