Visualization of the graph constructed using the vertex-based method. Brighter pixels correspond to vertices that are connected to shorter edges.

Visualization of the graph constructed using the vertex-based method. Brighter pixels correspond to vertices that are connected to shorter edges.

Source publication
Article
Full-text available
Stenographic methods are closely related to the security and confidentiality of communications, which have always been essential domains of human life. Steganography itself is a science dedicated to the process of hiding information in public communication channels. Its main idea is to use digital files or even communication protocols as a medium i...

Context in source publication

Context 1
... A i means the set of neighbor pixels to pixel i. Figure 3 presents the input image, which was overlaid with lengths of edges linked to specific pixels. ...

Citations

... Because the human visual system is insensitive to image details and images have a high degree of pixel value redundancy, they are regarded as excellent carriers among other sorts of carrier objects. The host image or cover picture is the original image that does not include any hidden information, while the steganographic image is the image that does [11]. ...
Article
Full-text available
Steganography, which is the science of delivering a message between parties in a way that an eavesdropper will not be aware that the message exists, is one of the key disciplines that have a considerable interest in fields. The suggested method seeks to conceal a smaller color image within a larger color image. It utilizes the transform domain throughout the steganography process to increase its resistance to changes and treatments made to the cover image. In order to achieve both complexity security and robustness, the project seeks to implement and utilize two techniques: ant colony optimization and transformation domain approach. The technologies under consideration suggest a Steganography method for digital photographs. It employs Discrete Cosine Transform (DCT) to achieve the same aims in terms of security, transparency and robustness. Additionally, it makes use of Once an Ant Colony Optimization (ACO) to increase robustness against signal processing attacks and imperceptibility in accordance with the human visual system. This work implements ACO for the cover to find the embedding locations on the graph path, and then finds locations to hide information based on threshold method, when looking for places to hide information blocks, DCT uses an intelligent block matching technique between the embedded image and the cover image, and both systems were tested against each other to compare their performance. Six stages make up the proposed secret key steganography system: test, transform, key creation and substitution, ant colony optimization, matching, inverse transform, and key encryption and concealing.