Software

Secure Information Transmission Using Steganography and Morphological Associative Memory

Free registration required

Executive Summary

In this paper, the authors presents a new steganography algorithm based on Morphology associative memory. Often, steganalysis methods are created to detect steganography algorithms using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In this paper, cover images are mapped to morphological representation by using morphology transform containing morphological coefficients, and each bit of secret message is inserted in the least significant bit of morphological coefficients. To evaluate stego quality, they measure the quality of the cover image after embedding by comparing with other image transformed steganography algorithms such as discrete cosine and Wavelet transforms.

  • Format: PDF
  • Size: 526.63 KB