Files in this item
Human visual based perception of steganographic images
Item metadata
dc.contributor.author | Fyffe, Blair | |
dc.contributor.author | Wang, Yunjia | |
dc.contributor.author | Duncan, Ishbel Mary Macdonald | |
dc.date.accessioned | 2020-07-16T14:30:02Z | |
dc.date.available | 2020-07-16T14:30:02Z | |
dc.date.issued | 2019-06-07 | |
dc.identifier | 252027723 | |
dc.identifier | 30f20148-ea0b-4473-944d-6735c6de132e | |
dc.identifier.citation | Fyffe , B , Wang , Y & Duncan , I M M 2019 , ' Human visual based perception of steganographic images ' , Journal of Cyber Security Technology , vol. 3 , no. 2 , pp. 61-107 . https://doi.org/10.1080/23742917.2019.1609393 , https://doi.org/10.1080/23742917.2019.1609393 | en |
dc.identifier.issn | 2374-2917 | |
dc.identifier.other | RIS: urn:FF63E5BD66BE53B4F286B3E989E988D1 | |
dc.identifier.other | RIS: urn:FF63E5BD66BE53B4F286B3E989E988D1 | |
dc.identifier.other | ORCID: /0000-0001-7297-9199/work/78891579 | |
dc.identifier.uri | https://hdl.handle.net/10023/20273 | |
dc.description.abstract | In 2014 it was estimated that 1.8 billion images were uploaded daily to the Internet, and in 2018 it is estimated that 3.2 billion images are shared daily. Some of these uploaded images may contain hidden information that can potentially be malicious (e.g. an image that contains hidden information regarding terrorism recruitment) or may cause serious damage (e.g. an employee wishing to hide sensitive company details in an image file and exporting the image to third parties). This research studied the most effective methods in manipulating images to hide information (Data Loss). Significant work has been done on computational algorithmic detection. Yet the desired output from this work was to find the point at which a human can no longer visually establish the difference between an original image and a manipulated image. This research examines the extent of use for file formats, bit depth alterations, least significant bits, message and audio concealment and watermark and filtering techniques for image steganography. The findings of this study indicated that audio insertion and picture insertion into cover image files are the strongest in deceiving the human eye. These results have been categorised for human visual perception in image-based steganography. | |
dc.format.extent | 48 | |
dc.format.extent | 8944419 | |
dc.language.iso | eng | |
dc.relation.ispartof | Journal of Cyber Security Technology | en |
dc.subject | Steganography | en |
dc.subject | Data loss prevention | en |
dc.subject | Human perception | en |
dc.subject | Image manipulation | en |
dc.subject | QA75 Electronic computers. Computer science | en |
dc.subject | Computer Science(all) | en |
dc.subject | NDAS | en |
dc.subject | SDG 16 - Peace, Justice and Strong Institutions | en |
dc.subject.lcc | QA75 | en |
dc.title | Human visual based perception of steganographic images | en |
dc.type | Journal article | en |
dc.contributor.institution | University of St Andrews. School of Computer Science | en |
dc.identifier.doi | 10.1080/23742917.2019.1609393 | |
dc.description.status | Peer reviewed | en |
This item appears in the following Collection(s)
Items in the St Andrews Research Repository are protected by copyright, with all rights reserved, unless otherwise indicated.