id="info"

Secure Information Transmission Using Steganography and Morphological Associative Memory

In this paper, the authors presents a new steganography algorithm based on Morphology associative memory. Often, steganalysis methods are created to detect steganography algorithms using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In this paper, cover images are mapped to morphological representation by using morphology transform containing morphological coefficients, and each bit of secret message is inserted in the least significant bit of morphological coefficients. To evaluate stego quality, they measure the quality of the cover image after embedding by comparing with other image transformed steganography algorithms such as discrete cosine and Wavelet transforms.

Provided by: International Journal of Computer Applications Topic: Software Date Added: Jan 2013 Format: PDF

Find By Topic