Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

PDF

Turkish Journal of Electrical Engineering and Computer Sciences

2013

Data hiding

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Data Hiding In Digital Images Using A Partial Optimization Technique Based On The Classical Lsb Method, Feyzi̇ Akar, Yildiray Yalman, Hüseyi̇n Selçuk Varol Jan 2013

Data Hiding In Digital Images Using A Partial Optimization Technique Based On The Classical Lsb Method, Feyzi̇ Akar, Yildiray Yalman, Hüseyi̇n Selçuk Varol

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a new partial optimization approach for the least significant bit (LSB) data hiding technique that can be used for protecting any secret information or data. A deterioration effect of as little as possible in an image is intended using the LSB data hiding technique and this is well realized utilizing the proposed partial optimization approach achieving the same data embedding bit rates. In the proposed approach, all of the image pixels are classified into 8 regions and then the 8 distinct ordering codings are applied to each region by the developed partial optimization encoder. Thus, the most …


A New Digital Image Steganography Algorithm Based On Visible Wavelength, İbrahi̇m Coşkun, Feyzi̇ Akar, Özdemi̇r Çeti̇n Jan 2013

A New Digital Image Steganography Algorithm Based On Visible Wavelength, İbrahi̇m Coşkun, Feyzi̇ Akar, Özdemi̇r Çeti̇n

Turkish Journal of Electrical Engineering and Computer Sciences

Stenography is the science that ensures secret communication through multimedia carriers such as image, audio, and video files. The ultimate end of stenography is to hide the secret data in the carrier file so that they are not detected. To that end, stenography applications should have such features as undetectability; robustness; resistance to various images process, sing methods, and compression; and capacity of the hidden data. At the same time, those features distinguish stenography applications from watermarking and cryptography applications. This study is different from other studies in the literature in that the undetectability parameter has been achieved through hiding …