lecture26_alomari

The least significant bits of the host image are used

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: t significant bits of the host image are used to hide the most significant bits of the hidden image (for image-in-image hiding). The least significant bits can always be used to hide other data types. + = Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU The next example will show how image-in-image hiding works via this method. 1 IMAGE TECHNIQUES IMAGE TECHNIQUES Store host image and hidden image in memory. Original Images Bit Level 1 7 4 Pick the number of bits you wish to hide the hidden image in. Scan through the host image and alter its LSB’s with the hidden images MSB’s. So when 4 bits are used to hide information… Host Pixel: 10110001 Secret Pixel: 00111111 New Image Pixel: 10110011 To extract the hidden image, you basically take out the LSB’s from the host image and create a new image from them. LIMITATIONS AND ATTACKS BASIC ATTACKS Five categories of attacks: - Robustness attacks attempt to diminish or remove the watermark. - Presentat...
View Full Document

This note was uploaded on 05/17/2013 for the course CIS 102 taught by Professor Loaynemer during the Spring '13 term at University of Jordan.

Ask a homework question - tutors are online