Cryptography Reference
In-Depth Information
Fig. 5.12.
Result of the embedding capacity and the PSNR value (cover image:
Midnight).
secret data in the cover image. The experimental results have confirmed that
our new scheme is capable of confirming our claims.
References
1. Anderson, R.J., and Petitcolas F.A.P. (1998): On the limits of steganography.
IEEE Journal on Selected Areas in Communications,
16
, 474481
2. Bender, W., Gruhl D., and Lu, A.: Techniques for data hiding. IBM Systems
Journal,
35
, 313336
3. Petitcolas F.A.P., Anderson R.J., and Kuhn, M.G. (1999): Information hiding
A survey. Proceedings of the IEEE,
87
, 10621078