期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2012
卷号:3
期号:4
页码:4692-4695
出版社:TechScience Publications
摘要:In a computer, images are represented as arrays of values. These values represent the intensities of the three colors R(ed) G (reen) and B (lue), where a value for each of the three colors describes a pixel. Through varying the intensity of the RGB values, a finite set of colors spanning the full visible spectrum can be created. In an 8-bit gif image, therecan be 28 = 256 colors and in a 24-bit bitmap, there can be 224 = 16777216 colors. Large images are most desirable for steganography because they have the most space to hide data in. The best quality hidden image is normally produced using a 24-bit bitmap as a cover image. Each byte corresponding to one of the three colors and each three-byte value fully describes the color and luminance values of one pixel. The cons to large images are that they are cumbersome to both transfer and upload, while running a larger chance of drawing an “attacker’s” attention due to their uncommon size. Our main focus to introduce the stegnography using color transformation.
关键词:In a computer; images are represented as arrays of;values. These values represent the intensities of the three colors;R(ed) G (reen) and B (lue); where a value for each of the three;colors describes a pixel. Through varying the intensity of the;RGB values; a finite set of colors spanning the full visible;spectrum can be created. In an 8-bit gif image; therecan be 28 =;256 colors and in a 24-bit bitmap; there can be 224 = 16777216;colors. Large images are most desirable for steganography;because they have the most space to hide data in. The best;quality hidden image is normally produced using a 24-bit;bitmap as a cover image. Each byte corresponding to one of the;three colors and each three-byte value fully describes the color;and luminance values of one pixel. The cons to large images are;that they are cumbersome to both transfer and upload; while;running a larger chance of drawing an “attacker’s” attention;due to their uncommon size. Our main focus to introduce the;stegnography using color transformation.