Next Article in Journal
Experimental Study of Radial Distortion Compensation for Camera Submerged Underwater Using Open SaltWaterDistortion Data Set
Next Article in Special Issue
Visualization and Cybersecurity in the Metaverse: A Survey
Previous Article in Journal
Advanced Scene Perception for Augmented Reality
Previous Article in Special Issue
Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Study of the Information Embedding Method into Raster Image Based on Interpolation

by
Elmira Daiyrbayeva
1,2,
Aigerim Yerimbetova
1,3,*,
Ivan Nechta
4,
Ekaterina Merzlyakova
4,
Ainur Toigozhinova
2 and
Almas Turganbayev
1
1
Institute of Information and Computational Technologies Committee of Science of the Ministry of Education and Science of the Republic of Kazakhstan, Almaty 050010, Kazakhstan
2
Institute of Automation and Telecommunication, Academy of Logistics and Transport, Almaty 050012, Kazakhstan
3
Institute of Automation and Information Technologies of the Satbayev University, Almaty 050013, Kazakhstan
4
Department of Applied Mathematics and Cybernetics, Siberian State University of Telecommunications and Information Science, Novosibirsk 630102, Russia
*
Author to whom correspondence should be addressed.
J. Imaging 2022, 8(10), 288; https://doi.org/10.3390/jimaging8100288
Submission received: 20 July 2022 / Revised: 4 October 2022 / Accepted: 12 October 2022 / Published: 19 October 2022
(This article belongs to the Special Issue Visualisation and Cybersecurity)

Abstract

:
This article is devoted to the study of the improved neighbor mean interpolation (INMI) steganographic method. To date, no steganalysis of such a method of information embedding has been carried out. We implemented the INMI method of embedding messages in raster files and conducted a stegoanalysis on a set of 800 images of 225 × 225 size. Experimentally, we found that with this embedding method, the maximum container capacity is 21% and that it depends on the contents of the container. It is established that only 60 files out of 800 actually have the maximum capacity. We presented the calculation of the Type I error and the percentage of information detection in the obtained containers by the regular–singular (RS) method. The results showed that the considered steganographic algorithm is resistant to RS steganalysis and is comparable to the stegosystem of the permutation method investigated in one of our previous articles.

1. Introduction

To ensure the security of a communication channel, messages transmitted between two subscribers are modified in such a way that their interception by a third party is impossible. Usually, such modification utilizes cryptography methods. In a general setting, the message is encoded with the help of some secret key, accessible only to the sender and the recipient. Receiving the original message from the encoded one is almost impossible without knowing the secret key. Accordingly, the analysis of data transmitted over an open communication channel does not allow a third party to freely read the original message [1].
Steganography studies the confidential communication methods and is intended to hide the very existence of communication, unlike cryptography, which aims to make communication incomprehensible to those who do not have the necessary keys [2].
The problem of steganographic analysis or stegoanalysis is an important component of building an integrated information security system. First of all, steganographic methods of information transfer are employed for hidden data transfer in various files carrying redundant data. In this vein, media files are typically used as containers. Here, image files are of the greatest interest for research since images are exchanged much more often compared to other types of media, e.g., audio. For example, users actively send images to each other in various instant messengers and social networks [3].
In a general setting, a message can be confidentially transmitted via containers such as text, audio, video, image, and an executable file (program). Embedding a message into text can be carried out by replacing synonyms [4]. Here, words in the source text are replaced with synonyms corresponding to the embedded message. As a result, the obtained text has the same meaning but already contains a hidden message.
Embedding messages into images is a common practice in steganography. Any picture is represented as a matrix of pixels, where each pixel is defined via an RGB triple. One way of embedding a message here is the so-called least significant bit (LSB) embedding method [5,6]. In this method, the least significant bit of a pixel’s color is replaced with a secret message. The use of this approach does not distort the visual perception of the image.
The rapid development of LSB embedding methods has given rise to the emergence of steganalysis methods for images, i.e., methods for detecting the fact of transmission of a secret message. To fight against detection, LSB injection is carried out not in all pixels but only in a subdomain of the image, and these pixels are selected in a pseudo-random manner.

2. Literature Review and Problem Statement

In this paper, we are considering a steganographic method using interpolation. The essence of interpolation is to use the available data to obtain expected values at unknown points.
Image interpolation is a very important branch in image processing and is widely used in the world of imaging, e.g., in 3D medical imaging to compensate for the lack of information in image reconstruction by modeling additional images between acquired 2D images [7].
In [8], Ki-Hyun Jung demonstrated a new interpolation method in data hiding. The proposed method of neighbor mean interpolation (NMI) is characterized by low time complexity and high computational speed, which is important when working with large images. The experimental results of the NMI algorithm show that the proposed method can embed a large number of secret data while maintaining very high visual quality where the peak signal-to-noise ratio (PSNR) is guaranteed to be higher than 35 dB, which is an excellent rate for a reversible data concealment method. Similarly, this method has the greatest capacity among other reversible data hiding ones and is comparable to other data hiding methods.
Yevsyutin et al. made an overview of the main algorithms for embedding information into digital images using interpolation and proposed the INMI algorithm’s modification. The overview also included a comparison of the algorithms in terms of PSNR and maximum capacity [9].
As indicated in [9], all of the algorithms for embedding information into digital images using interpolation are constructed similarly. The input is an M × N -sized image and a secret message representing a binary sequence. The stegocontainer image with the size M × N is formed from the original image using an interpolation algorithm.
Following [9], let us consider two interpolation methods: NMI and INMI.
First, let us focus on the NMI method. In this algorithm, image interpolation is carried out in the following form: let I ( i , j ) be the pixel value of the original image, then the pixel value of the container image C ( i , j ) will be calculated in the following form (Equation (1)):
C ( i , j ) = I ( i , j ) i f i = 2 m , j = 2 n , ( I ( i , j 1 ) + I ( i , j + 1 ) ) / 2 , i f i = 2 m , j 2 n + 1 , ( I ( i 1 , j ) + I ( i + 1 , j ) ) / 2 , i f i = 2 m + 1 , j 2 n , ( I ( i 1 , j 1 ) + C ( i 1 , j ) + C ( i , j 1 ) ) / 3 , e l s e ,
where m = 0 , 1 , M 2 1 , n = 0 , 1 , , N 2 1 .
The pixel values of the image are calculated as follows. For each of the disjoint blocks with a size of 2 × 2 pixels, it is required to find the value of d k by the formula (Equation (2)):
d k = C ( i , j ) C d
where C d is the upper-left pixel of the block, k = 1 , 3 ¯ , after which the number of n k bits that can be embedded in the block and its integer representation b k is calculated, and the values of the corresponding pixels of the image are calculated.
Compared to INMI, the embedding capacity of NMI is less, while the quality of the resulting stegoimage is higher.
Now, let us consider the modified INMI method presented in [9]. The method is based on the use of the Lagrange interpolation polynomial of the second degree to obtain the container image. The image obtained by adding additional rows and columns of pixels to the original image is considered as 5-pixel fragments, numbered from 0 to 4. In this setting, the pixel values of the container image are calculated as follows (Equation (3)):
C k = C 0 ( x k 2 ) ( x k 4 ) 8 + C 2 x k ( x k 4 ) 4 + C 4 x k ( x k 2 ) 8 ,
where k = 1 , 3 ¯ is the pixel number in a fragment of five pixels.
As shown in [9], the modified INMI method yields increase in the PSNR value with a slight decrease in the embedding capacity. In this article, we performed a stegoanalysis of the modified INMI method using some known algorithms. In general, this type of stegoanalysis can be applied to the whole class of interpolation methods.

3. Materials and Research Methods

This article aims to investigate the considered modification of the INMI method by conducting a steganalysis with available means. We use RS analysis as the primary method of image steganalysis in this study. This type of steganalysis allows us to obtain results comparable to the findings of Merzlyakova [10]. RS analysis is based on the application of double statistics obtained from spatial correlations in images.
Currently, there are no studies analyzing the performance of such algorithms using stegoanalysis methods.
One of the preeminent methods of statistical stegoanalysis is the regular–singular (hereinafter referred to as RS) method, which was developed by Fridrich et al. in 2001 [11,12].
The RS analysis method serves to detect LSB embedding and uses a sensitive method of dual statistics derived from spatial correlations in the input images. In a general LSB picture, the matrix can be predicted to some extent from the matrices of the remaining 7 bits. Such a prediction becomes less reliable after embedding information in the least significant bits, as LSBs become random. This can be mathematically expressed and used to construct a sensitive and accurate stegoanalysis method. For high-quality images taken from a digital camera or scanner, RS analysis indicates that the safe capacitance is less than >0.005 bits per pixel.
The essence of the method is as follows: the entire image is divided into groups of n pixels G ( x 1 , x 2 , , x n ) , where n is even. For groups of pixels, the regularity function f ( G ) is defined. By pixel value, we mean a number from 0 to 255.
f ( x 1 , x 2 , , x n ) = i = 1 n 1 x i + 1 x i
The F ( x ) function is called flipping and has the F ( F ( x ) ) = x property. Two flipping functions are defined: F 1 , corresponding to the inversion of the least significant bit of the pixel, and F 1 , which is the inversion with the transfer to the most significant bit:
F 1 = x + 1 , 0 x 254 0 , x = 255   and   F 1 = x 1 , 0 x 255 255 , x = 0
When flipping is applied to a group, a transformed group of pixels is obtained. All groups of pixels are divided into classes as follows:
  • If f ( F ( G ) > f ( G ) , then f R ( r e g u l a r ) ;
  • If f ( F ( G ) < f ( G ) , then f S ( s i n g u l a r ) ;
  • If f ( F ( G ) = f ( G ) , then f U ( u n u s a b l e ) .
The RS method may indicate a small non-zero message length due to random deviations even for an empty container. This initial non-zero deviation can be either positive or negative and imposes a limit on the achievable accuracy of the RS analysis.
For each group, flipping is performed twice: with a direct and with an inverted mask. After carrying out classification operations for all groups, a number of quantitative characteristics are calculated:
  • The number of regular mask groups M : R M ;
  • The number of unusual groups for the mask M : S M ;
  • The number of regular groups for the inverse mask M : R M ;
  • The number of unusual groups for the inverse mask M : S M .
RS analysis shows more accurate results for messages that are distributed around the image, compared to the analysis of messages that are concentrated in a certain area of the image.
Figure 1 shows a typical RS-plot of R M , S M , R M , S M values versus the number of pixels with inverted LSB in the image (See Figure 1).
Merzlyakova proposed methods for embedding messages in BMP files [10] and carried out their RS analysis, which helped identify the stability of the various embedding algorithms.

4. Research Results

4.1. Conducting RS Analysis

To evaluate the modified INMI algorithm, we use the RS method offered by Yeltysheva et al. [13]. The maximum amount of information that can be written to a container using the injection method is called the empirical capacity of the container. The parsing program of RS analysis yields the amount of embedded information ( L ) as a percentage of the empirical capacity of the container, which is calculated as in LSB embedding.
C L S B = 3 w h   bit
By the value of L, one can judge whether the container is full or empty: at L ≥ 5%, RS classifies the container as full. We also mention two hypotheses: H s , meaning that the container contains a stegomessage, and an alternative hypothesis H s , meaning that the container does not contain embedded information. The decision rule is that each container is assigned one of two hypotheses. Two types of errors are possible here: Type I error, which consists in establishing the hypothesis H s when the container is empty, and Type II error, when the decision H s is made when there is embedded information in the container. The scheme of experimental studies presented below shows the obtained results (See Figure 2).
To conduct an RS analysis of this method, we needed to determine the capacity of containers in terms of the percentage of involvement of the least significant parts of the image matrix. It is paramount to compare the obtained results of steganalysis with the results of other embedding methods considered by Merzlyakova [10].
Based on the modified INMI algorithm, we determine that the maximum container capacity is 21% and that it depends on the image contents.
After conducting a study on a set of 800 images of 225 × 225 size [14], we concluded that 60 of them have the maximum capacity. The findings presented in Table 1 display the RS analysis Type I errors on empty containers. In contrast with Table 1, from the results of the RS analysis in Table 2, one can conclude that the method is resistant to the RS analysis.
The findings of the stegoanalysis presented in Table 1 and Table 2 indicate that the percentage of embedded information detection using the proposed method is approximately equal to the percentage of files with Type I errors.
Accordingly, Table 3 and Table 4 present the results of the study of 60 pictures from the full set of 800 images, with an average filling percentage of 12% (See Table 3 and Table 4).
Apparently, the less information we embed in the image, the less likely it is that detectable features will appear as a result of the implementation process [15]. As we see from the tables above, the modified INMI method is resistant to an RS attack as much as the stegosystem of the permutation method for raster images, described in [10]. The percentage of change of the lower bits in the compared methods is approximately the same and differs in different implementations of the permutation stegosystem [10]. Since the lower bits are not the only ones involved in the interpolation method, it makes sense to also analyze the compression ratio of empty and filled containers.
Consequently, sustainable implementation methods using interpolation are crucial for further development. Therefore, we plan to perform and study implementation methods using the Bezier curve.

4.2. Compression Ratio Analysis

It is acknowledged that the original container and the information added to it are statistically independent; therefore, when hidden data are added to the container, its size during compression increases compared to the size of the compressed initial empty container [10]. Changes in the compression ratio in the opposite direction also indicate signs of change. Let us consider the study in which we will determine the compression ratios of empty and filled containers. The compression ratio is the main characteristic of the compression algorithm. It is defined as the ratio of the number of original uncompressed data to the number of compressed data.
Table 5 and Table 6 show the results of comparing the compression ratios for empty and filled containers. Here, X = { x 1 , x N } is the sequence of data bytes of the empty container, and f ( X , n ) is the compression ratio of the sequence X by the ZIP archiver. Y = { y 1 , y N } is a sequence of data bytes of the filled container, f ( Y , n ) is the compression ratio of the Y sequence by the RAR archiver, and δ ( X , n ) is the difference between the compression ratios of the segments of the X and Y sequences. For convenience, the part of the results are presented apart in the Tables below since they are monotonous for the entire selection of files (See Table 5 and Table 6).

5. Conclusions

There are various studies in the field on the topic of developing new algorithms for embedding information into graphics files, but it is the interpolation methods that we think have been incompletely investigated and need to be clarified. Our goal was to find out how the proposed methods are resistant to stegoanalysis.
The novelty of the proposed research is that image steganography methods using interpolation have not been previously subjected to stegoanalysis, and the studies cited in the literature do not reflect the stego-resistance of these methods in any way. Our studies help to determine the level of stegoanalysis robustness of the proposed methods.
We have implemented and investigated the notable INMI algorithm, or rather its best modification, and carried out stegoanalysis of this embedding method. The results obtained can be compared with the stegoanalysis of the methods considered by Merzlyakova.
Based on the examined INMI algorithm, we dispose that the maximum container capacity is 21% and depends on the image. Based on the results of a study on a set of 800 225 × 225 images, we determine that 60 of them have the maximum capacity. The above presented findings display the calculation of the Type I errors as 0%.
The findings of RS analysis are shown in Table 2, where one may observe that the method is stable RS and comparable in resistance and capacity to the stoichiometry of the method of permutation for raster images, considered in the above mentioned studies. Additionally, the percentage of change of low-order bits in the compared methods is approximately the same and differs in different implementations of the stegosystem. Nevertheless, because the interpolation method involves not only low-order bits, we used a specific method to analyze the degree of compression in empty and filled containers.
The results of stegoanalysis were obtained on a set of photos with a certain amount of embedded information. If this amount is too small (less than 5% of the total data), the RS cannot be applied. Additionally, the input data for embedding must not have dependencies but must be a random sequence of bits, so the correlations used in the stegoanalysis method are not broken. The methods used are suitable for bmp raster images.
The above result can be used in further developments of information embedding methods using interpolation, to compare the effectiveness of embedding methods on attributes such as stego-resistance.
Likewise, in the study, we determined the compression ratios of empty and filled containers. The value of the differences in the coefficients δ ( X , n ) obtained in this study is close to zero, which means the statistical structures of the empty and filled containers are similar.
Thence, we plan to develop sustainable steganographic methods for embedding information into raster files using other interpolation tools, as well as to analyze them using different approaches.

Author Contributions

Methodology, E.M. and I.N.; software A.T. (Almas Turganbayev); validation, E.M., I.N. and A.Y.; formal analysis, A.T. (Aynur Toigozhinova); investigation, E.D.; data curation, E.M.; writing—original draft preparation, E.D.; writing—review and editing, A.Y.; supervision, A.Y. and I.N.; and project administration, E.M. and E.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research has been funded by the Science Committee of the Ministry of Education and Science of the Republic of Kazakhstan (Grant No. AP08857179).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Daiyrbayeva, E.; Yerimbetova, A.; Toigozhinova, A.; Maratov, Z.; Sambetbayeva, M. Learning steganography with a strip transform. In Proceedings of the 6th International Conference on Computer Science and Engineering, UBMK, Ankara, Turkey, 15–17 September 2021; pp. 195–198. [Google Scholar] [CrossRef]
  2. Fridrich, J.; Golja, M.; Du, R. Reliable Detection of LSB Steganogra-phy in Color and Grayscale Images. In Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, Ottawa, ON, Canada, 5 May 2001; pp. 27–30. [Google Scholar] [CrossRef]
  3. Vil’khovskiy, D.E. Algoritmy Steganograficheskogo Analiza Izobrazheniy s Nizkim Zapolneniyem Stegokonteynera: Diss… Kand. Tekh. Nauk: 05.13.19—Omsk: Omskiy Gosudar-Stvennyy Universitet im. F.M. Dostoyevskogo. 2021, p. 135. Available online: https://www.ugatu.su/media/uploads/MainSite/Science/dissovet/07/2020/vilkhovsky-de/dissert_vilkhovsky-de.pdf (accessed on 20 June 2022).
  4. Chang, C.Y.; Clark, S. Practical linguistic steganography using contextual syno-nym substitution and a novel vertex coding method. Comput. Linguist. 2014, 40, 403–448. [Google Scholar] [CrossRef]
  5. Chatterjee, A.; Ghosal, S.K.; Sarkar, R. LSB based steganography with OCR: An intelligent amalgamation. Multimed. Tools Appl. 2020, 79, 11747–11765. [Google Scholar] [CrossRef]
  6. Cherikbayeva, L.; Yerimbetova, A.; Daiyrbayeva, E. Research of Cluster Analysis Methods for Group Solutions of the Pattern Recognition Problem. In Proceedings of the 6th International Conference on Computer Science and Engineering, UBMK, Ankara, Turkey, 15–17 September 2021; pp. 494–497. [Google Scholar] [CrossRef]
  7. Lee, C.-F. An efficient image interpolation increasing payload in reversible data hiding. Expert Syst. Appl. 2012, 39, 6712–6719. [Google Scholar] [CrossRef]
  8. Jung, K.-H.; Yoo, K.-Y. Data hiding method using image interpolation. Comput. Stand. Interfaces 2009, 31, 465–470. [Google Scholar] [CrossRef]
  9. Yevsyutin, O.; Kokurina, A.; Meshcheryakov, R. Algoritmy Vstraivaniya Informatsii v Tsifro-Vyye Izobrazheniya s Primeneniyem Interpolyatsii // Doklady TUSUR. 2015. №4 (38). Available online: https://cyberleninka.ru/article/n/algoritmy-vstraivaniya-informatsii-v-tsifrovye-izobrazheniya-s-primeneniem-interpolyatsii (accessed on 20 March 2022).
  10. Merzlyakova, E.Y. Postroyeniyesteganograficheskikhsistemdlyarastrovykhizobra-Zheniy, Baziruyushchikhsyanateoretiko-informatsionnykhprintsipakh: Dis.… Kand. Tekhn. Nauk: 05.13.19.—Novosibirsk: SibGUTI. 2011. Available online: https://www.dissercat.com/content/postroenie-steganograficheskikh-sistem-dlya-rastrovykh-izobrazhenii-baziruyushchikhsya-na-te (accessed on 1 July 2022).
  11. Vishnevskaya, T.; Utochkina, N. Steganograficheskiy Metod, Ustoychivyy k Povrezhdeni-yu Dannykh // ITNOU: Informatsionnyye Tekhnologii v Nauke, Obrazovanii i Upravlenii. 2020. №1 (15). Available online: https://cyberleninka.ru/article/n/steganograficheskiy-metod-ustoychivyy-k-povrezhdeniyu-dannyh (accessed on 20 March 2022).
  12. Grachev, Y.L.; Sidorenko, V.G. Steganalysis of the methods of concealing information in graphic containers. Dependability 2021, 21, 39–46. [Google Scholar] [CrossRef]
  13. Merzlyakova, E.Y.; Fionov, A.N. Postroyeniye Stegosistemy na Baze Rastrovykh Izobrazheniy s Uchetom Statistiki Mladshikh bit // Vestnik FGOBU VPO «SibGUTI». 2009. №1. S. pp. 67–84. Available online: http://vestnik.sibsutis.ru/uploads/1309329432_590.pdf (accessed on 5 July 2022).
  14. Digital Image Interpolation [URL]. Access Mode. Available online: https://disk.yandex.ru/d/ZHx4FV3t1t_T5g (accessed on 8 July 2022).
  15. Chandramouli, R.; Memon, N. Analysis of LSB based Image Steganography Techniques. In Proceedings of the ICIP, Thessaloniki, Greece, 7–10 October 2001; Available online: https://nyuscholars.nyu.edu/en/publications/analysis-of-lsb-based-image-steganography-techniques (accessed on 7 July 2022).
Figure 1. RS–diagram.
Figure 1. RS–diagram.
Jimaging 08 00288 g001
Figure 2. Scheme of experimental studies.
Figure 2. Scheme of experimental studies.
Jimaging 08 00288 g002
Table 1. RS analysis on a set of 225 × 225 empty containers.
Table 1. RS analysis on a set of 225 × 225 empty containers.
L
0%1–4%5% and More
Percentage of correctly detected stegocontainers5446-
Table 2. RS analysis on a set of 225 × 225 containers filled with 21% interpolation method.
Table 2. RS analysis on a set of 225 × 225 containers filled with 21% interpolation method.
L
0%1–4%5% and More
Percentage of correctly detected stegocontainers5347-
Table 3. RS analysis on a set of 225 × 225 empty containers (800 images).
Table 3. RS analysis on a set of 225 × 225 empty containers (800 images).
L
0%1–4%5% and More
Percentage of correctly detected stegocontainers6139-
Table 4. RS analysis on a set of 225 × 225 containers filled using the interpolation method by 12%.
Table 4. RS analysis on a set of 225 × 225 containers filled using the interpolation method by 12%.
L
0%1–4%5% and More
Percentage of correctly detected stegocontainers51.548-
Table 5. Comparison of differences in compression ratios for empty and filled containers.
Table 5. Comparison of differences in compression ratios for empty and filled containers.
File Name f ( X , n ) ,
MB
f ( Y , n ) ,  
MB
δ ( X , n )
001.BMP0.1330.1340.02
002.BMP0.1370.1380.01
003.BMP0.0860.0860.00
004.BMP0.1050.1060.01
005.BMP0.1510.1530.00
006.BMP0.0330.0330.00
007.BMP0.1460.1480.02
008.BMP0.1250.1260.01
009.BMP0.1170.1180.01
010.BMP0.0720.0720.00
117.BMP0.0650.0650.00
140.BMP0.0590.0590.00
180.BMP0.1290.1310.02
222.BMP0.1340.1350.01
244.BMP0.1020.1030.01
25.BMP0.1350.1360.01
250.BMP0.0720.0720.00
258.BMP0.1290.1310.02
317.BMP0.0710.0720.01
37.BMP0.1330.1340.01
388.BMP0.1080.1090.01
405.BMP0.0860.0860.00
465.BMP0.1320.1340.02
521.BMP0.0980.0990.01
528.BMP0.1170.1180.01
610.BMP0.1000.1000.00
68.BMP0.1500.1520.02
72.BMP0.1050.1070.02
752.BMP0.1470.1490.02
785.BMP0.1140.1150.01
796.BMP0.0690.0690.00
Average value0.1080.1090.01
Table 6. Comparison of compression ratio differences for empty and filled containers (by RAR archiver).
Table 6. Comparison of compression ratio differences for empty and filled containers (by RAR archiver).
File Name f ( X , n ) ,
MB
f ( Y , n ) ,
MB
δ ( X , n )
001.BMP0.0990.1010.02
002.BMP0.1040.1070.03
003.BMP0.0680.0690.01
004.BMP0.0880.0900.02
005.BMP0.1140.1170.03
006.BMP0.0290.0290.00
007.BMP0.1100.1140.04
008.BMP0.0910.0940.03
009.BMP0.0890.0910.02
010.BMP0.0580.0580.00
117.BMP0.0490.0490.00
140.BMP0.0410.0410.00
180.BMP0.0930.0960.03
222.BMP0.0910.0930.02
244.BMP0.0780.0800.02
25.BMP0.0890.0910.02
250.BMP0.0600.0600.00
258.BMP0.0990.1020.03
317.BMP0.0560.0570.01
37.BMP0.1010.1040.03
388.BMP0.0740.0760.02
405.BMP0.0660.0670.01
465.BMP0.1000.1030.03
521.BMP0.0710.0730.02
528.BMP0.0870.0890.02
610.BMP0.0850.0870.02
68.BMP0.1120.1150.03
72.BMP0.0760.0790.03
752.BMP0.1080.1120.04
785.BMP0.0790.0800.01
796.BMP0.0570.0580.01
Average value0.0820.0830.01
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Daiyrbayeva, E.; Yerimbetova, A.; Nechta, I.; Merzlyakova, E.; Toigozhinova, A.; Turganbayev, A. A Study of the Information Embedding Method into Raster Image Based on Interpolation. J. Imaging 2022, 8, 288. https://doi.org/10.3390/jimaging8100288

AMA Style

Daiyrbayeva E, Yerimbetova A, Nechta I, Merzlyakova E, Toigozhinova A, Turganbayev A. A Study of the Information Embedding Method into Raster Image Based on Interpolation. Journal of Imaging. 2022; 8(10):288. https://doi.org/10.3390/jimaging8100288

Chicago/Turabian Style

Daiyrbayeva, Elmira, Aigerim Yerimbetova, Ivan Nechta, Ekaterina Merzlyakova, Ainur Toigozhinova, and Almas Turganbayev. 2022. "A Study of the Information Embedding Method into Raster Image Based on Interpolation" Journal of Imaging 8, no. 10: 288. https://doi.org/10.3390/jimaging8100288

APA Style

Daiyrbayeva, E., Yerimbetova, A., Nechta, I., Merzlyakova, E., Toigozhinova, A., & Turganbayev, A. (2022). A Study of the Information Embedding Method into Raster Image Based on Interpolation. Journal of Imaging, 8(10), 288. https://doi.org/10.3390/jimaging8100288

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop