Cart (Loading....) | Create Account
Close category search window

Histogram Shift Steganography: A Technique to Thwart Histogram Based Steganalysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Mohsenzadeh, Y. ; Sharif Univ. of Technol., Tehran, Iran ; Mohajeri, J. ; Ghaemmaghami, S.

We present an image steganographic technique to preserve the first-order and the second-order statistics of the host image. Experimental results show that the proposed method can preserve the image quality and also resists typical statistical analysis based attacks. The new steganography method solves the distortion problem with the HKC algorithm and hence thwarts the Kuo attack. The method is based on the idea of histogram shift, in which two empty bins are produced in the image histogram that are then filled up using their neighboring bins through the embedding process.

Published in:

Computer Science and Engineering, 2009. WCSE '09. Second International Workshop on  (Volume:2 )

Date of Conference:

28-30 Oct. 2009

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.