DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM *

Size: px
Start display at page:

Download "DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM *"

Transcription

1 International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 3, No. 2, pp. 5, 26 DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM * VALERY KORZHIK State University of Telecommunications, St. Petersburg, Russia val-korzhik@yandex.ru GUILLERMO MORALES-LUNA Computer Science, CINVESTAV-IPN, Mexico City, Mexico gmorales@cs.cinvestav.mx IVAN FEDYANIN State University of Telecommunications, St. Petersburg, Russia ivan.a.fedyanin@gmail.com One of the most promising direction in the design of high speed stegosystem was project HUGO based on the use of trellis codes (TC) and Viterbi Algorithm(VA) in the embedding procedure. However the optimality of VA was kept still unclear because a generic purpose of VA is to correct errors.we prove that optimality of embedding can be achieved with the use of generalised Viterbi algorithm(gva) proposed by one of the authors of this paper about 3 years ago. Optimisation of the trellis code check matrix based on the use of GVA is also considered. The second goal of the current paper is to consider to use TC jointly with GVA in order to provide both security of a stegosystem and simultaneously their ability to correct errors which can be induced by an attacker in order to remove embedded information even in the case if the attacker is unable to detect a presence of hidden information (blind attack). We consider also a trade off between security and error correction. Experimental results show that it is possible to build a stegosystem with acceptable errorcorrection capabilities together with minimization of the embedding impact. Keywords: Error correction, generalised Viterbi algorithm, HUGO project, images, stegosystem, trellis codes.. Introduction Steganography (SG) is the information hiding technique that embeds the hidden information into an innocent cover object (CO) under conditions that CO is not corrupted significantly and that a presence of the additional information in CO may not be detected. This goal entails an obvious requirement: the embedding impact has to be minimised from the steganalysis point of view. Moreover, it does not mean that the number of

2 2 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin changes into CO just after embedding should be minimized because the change weights may differ, hence a minimisation of changes into CO does not necessary results in a minimisation of SG detectability. Let X n n 2 be a grey scale cover image and let Y n n 2 be the resulting image after embedding using some stego-algorithm. Let D(X,Y ) be the distortion of the stegoimage and the cover image, in the sense of ability of the SPAM stegoalgorithm to distinguish X and Y. Up to an enumeration of the pixel arrays, the images can be regarded as linear arrays of length n = n n 2. The additive distortion function chosen for Highly Undetectable stego (HUGO) algorithm [Pevný et al. (2)] is () where, ρ i + {+ } is the weight coefficient (the cost of changing the i-th pixel), x i,y i are the values of the i-th pixel at X and Y respectively. All changes are restricted to ± increments, so that the following inequality holds after ±-embeddings in LSB: The additive form of () means that detectability of SG does not depend on the correlation between the embedded bits. That assumption holds when the changed pixels are located sufficiently far from each other, which in turn holds when the embedding rate is relatively low. Three problems arise in the design of effective SG: () How to choose adequately the weights i= n? (2) What is the best coding method for changing pixels according to their weights? (3) How to correct errors caused by blind attack jointly with effective SG detecting? In order to find the pixel weights to be used at (), for each i {,,n}, let Y (i) be the image X with the i-th pixel changed. Then, j {,,n} : x j - y j (i). Let us pick ρ i = D(X,Y (i) ). The weight D(X,Y ) can be calculated as proposed in [Pevny et al. (2)], as the addition of two sums: where the map C dd2 k is calculated, in line with the SPAM features, as the Markov transition probabilities for the eight directions at U V, with In particular, for the case of the horizontal direction ( ), for any integers d,d 2 [-T,T]:

3 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 3 (3) where for i n and j n 2 -, D i,j = X i,j - X i,j+. As in [Pevny et al. (2)], we consider a weight function of the form: for some optimised parameters σ > and γ >. It is well known [Fridrich (29)] that in order to minimise the number of changes among pixels of the CO, a syndrome coding may be used: (5) where y is the block of stego-image bits of length n = n n 2, m is a block of information bits of length k that should be embedded into y and H is a (k n)-matrix chosen for encoding. Next, among all the solutions y, for given m and H, it is necessary to select those providing minimum number of changes between y and its CO block x. At [Fridrich (29)], a technique to solve this problem was presented, and it is especially simple for the Hamming code with a specific check matrix H. But in our case it is necessary to minimise not the number of changes in CO but the distortion function D : (X,Y ) D(X,Y ) given by (). It seems to be similar to a transition from hard decoding to soft decoding in communications where trellis codes using Viterbi algorithm for decoding can be more favourable than block codes, using some algebraic decoding algorithms. Nevertheless there exists a significant difference in the solution of the matrix equation (5) with respect to y given m with minimising the distortion function D given x as a CO and the solution of the error correction procedure equation Hm = y, given some distance between y and x. Fortunately, there exists the so called Generalised Viterbi Algorithm (GVA) proposed in 984 [Korzhik (984), Korzhik and Lopato (987)] that is able to describe both error correction and also steganographic embedding problem in analytic form without execution on trellis graphs. This method of stegosystem design based on trellis codes and GVA becomes clearer and gets a strict justification. We describe GVA and its application to steganographic problem design in the Section 2. Results of matrix optimisation, which are obtained by simulation with the use of GVA, are presented in Section 3. In Section 4 it is considered a combination of TC and GVA in order to minimise both SG detectability and simultaneously to correct errors caused by blind attack. Section 5 concludes the paper. 2. Application of GVA to the SG system design problem Let us initially state a problem that results in a natural solution within GVA [Korzhik (984), Korzhik and Lopato (987)]. Problem. Find where (4) (6)

4 4 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin ν N -, each entry x j is in the set X, card = r, and λ is a real function defined on the set of finite length real sequences. Here, the goal at (6) is to minimise the function, but it can be used to maximise the function, as well. The stated problem can be solved through the so called GVA introduced at [Korzhik and Lopato (987)]: () Find = argmin x Λ ν+ (x,x 2,,x ν+ ). (2) Find 2 = argmin xs Λ ν+2 (,x 2,,x ν+2 ). (3) (4) Find s = argmin xs Λ ν+2 (,, s-,x s,,x ν+s ). (5) (6) Find ( N-ν,, N) = argmin (xn-ν,,xn)λ ν+2 ( N), where N = (,, N-ν-,x N-ν,,x ν+s ) It is easy to see that for all steps, except the last one, the number of calculations for every argument is at most r ν+ and the last step requires at most r ν operations. We note that the conventional VA is a particular case of GVA with ν =. Then: (7) If we assume now that each x k in (7) is the state of trellis on the k-th step and λ(x k,x k+ ) is the length of branch from the state x k to the state x k+, then the decoding problem for convolutional code presented by trellis diagram is equivalent to a minimisation of (6). But fortunately, GVA can be used also for a situation of embedding problem for SG given by (5) that seems to be at a single glance completely different than correction of errors by convolutional codes. Let us consider a matrix H in (5) that has the step-wise sliding form based on a submatrix of order t w pictured at Fig.. Fig.. H as a step-wise sliding matrix..

5 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 5 In order to simplify further the description, let us consider the particular case of t = 2, w = 2, and = i,j 2. Let us assume also k >, and n = 2k. Then equation (5) can be written as follows: (8) with y = T, m = T, determining the equation system (9) It is possible to apply GVA to solve the system (9) given the column vector m and x providing a minimisation of the weight This algorithm can be performed through the following steps: () Build the Table of variants (ŷ,ŷ 2 ) for all possible tuples (y 3,y 4 ) satisfying equation (9), for j = 2, and minimise the function where ρ(x i,y i ) = ρ i x i - y i. (2) Build the Table of variants (ŷ 3,ŷ 4 ) for all possible tuples (y 5,y 6 ) satisfying equation (9), for j = 3, and minimise the function where ρ(x i,y i ) = ρ i x i - y i. Proceed similarly up to the last equation at (9). Example. Let k = 3, ρ i = for i =,,6, x = and m =. Then the matrix H is

6 6 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin In line with (8) we have () () In order to satisfy the first equation in (9) we get two possibilities (y,y 2 ) = (,), and (y,y 2 ) = (,). (2) For all possible pairs (y 3,y 4 ) and (y,y 2 ) which are obtained in the Step ) we get the possibilities to satisfy the second equation in (9) shown at Table. Table. Illustration for step y y 2 y 3 y (*) 4 * * * * (*) Left side of the second equation in (9) Asterisk means that left side of the second equation of (9) coincides with m 2 =. Table. Values of Λ. In Table there are presented also the calculation results of the values Λ for survived strings (with an asterisk). Next in Table 2 we present all possible pairs (y 3,y 4 ) satisfying to the corresponding equation in (9) for every pair (y 5,y 6 ). Table 2. Admissible tuples (y,y 2,y 3,y 4 ). y 3 y 4 y 5 y 6

7 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 7 By combining the Tables and 2, we get Table 3 presenting all possible(y,y 2,y 3,y 4 ) tuples for every pair (y 5,y 6 ) and corresponding to them, the values Λ 3. Table 3. Values of Λ 3. y y2 y3 y4 y 5 y Now it is possible to minimise Λ 3 by selecting a pair (y 5,y 6 ). This gives two optimal tuples y = and y =. It is easy to see that each of these tuples requires one change of the tuple x and satisfies the equation (). This approach can be extended to any step-wise matrix generated by shifting the (t w)- submatrix. Then the complexity for GVA will be of the order O(kwt2 wt ) with respect to operations. 3. Optimisation of by simulation with GVA Let us consider initially the case with ρ i =, for i =,,n. This means that we try to minimise the number of changes into the image pixels after embedding against the sizes t and w of a randomly chosen submatrix. The results of simulation for randomly chosen CO are shown in Fig. 2 where relative changes are presented on the vertical axis.

8 8 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin (a) (b) Fig. 2. Relative changes of randomly chosen binary sequence of length 5 as CO after embedding based on trellis codes. (a) Against the matrix parameter t given w, and (b) against the matrix parameter w given t. From Fig. 2 it can be seen that it is sufficient to bound the sizes of the submatrix 5, w, at least for the case ρ i =, for i =,,n. as t But it is more interesting to investigate the undetectability of SG based on trellis embedding into real images under the condition that the SG detection is performed by blind SVM-based steganalysis with the use of SPAM features (see (2)-(4)). The experiment has been arranged as follows: The image base was taken similar to those considered in [Bas et al. (2)]. Since the embedding procedure is very time-consuming the images were reduced to lesser sizes. The weight coefficients ρ ij in () were calculated by (2), (3) with the weight function (4) after optimisation of parameters σ and γ. At the

9 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 9 training SVM stage both 5 images with and without embedding were used. During the testing SVM stage, there were executed 5 images with and without embedding. This HUGO-based algorithm was compared with conventional ± embedding algorithm taken with the same embedding rate R =, where k is the number of embedded bits and n is the number of image pixels. As a criterion of stegosystem undetectability, it was used (in line with a recommendations [Pevný et al. (2)]) the averaged error probability P e = where P m is the probability of SG missing and P fa is the probability of SG false alarm. The value P e has been minimised at the cost of SVM threshold optimisation. The results of simulations are shown in Tables 4 and 5. Table 4. The probabilities of incorrect ± SG system detection (P e ) for different image sizes and embedding rates R. Image size P e Embedding rate k / n 6x x x x x Table 5. The probabilities of incorrect HUGO SG system SPAM-based detection (P e ) for different image sizes and embedding rates R Image size Embedding SPAM parameters P e rate k / n T 6x x x x We can see from these Tables that the use of the HUGO trellis code-based SG offers some advantages in undetectabilities against a conventional ± in LSB embedding SG. It is worth to note that the undetectability of SG, even in the case of a trellis code-based embedding (used with the HUGO project), depends significantly on the image texturing. We have found that the greater is the degree of texture, the most frequent undetectability of the corresponding image. Qualitatively, image texturing means that the image has a presence of precise contours, while not texture images have sliding luminance changing and noisy background. Numerically image texture can be estimated by the parameter [Pevný et al. (2)] () where B ij k is a (2 2)-pixel block with (i,j)-coordinates and k is the k-th pixel of this block. As it can be seen by (), in order to calculate a measure of image texture t n it is

10 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin necessary to divide the image on disjoint (2 2)-blocks and next to calculate for every block the difference between maximum and minimum pixel luminance of this block. In Table 6 there are presented the averaged error detecting probabilities for HUGO-based SG after embedding of messages into the images with different texturing. For both SVM training and testing phases 5 images from different image sets were used. Table 6. The error detecting probabilities for HUGO-based SG after embedding of messages into the images with different texturing. Image t Embedding SPAM parameters n P e size rate k / n T 64x64 < x64 > We can see from this Table that, in fact, the level of image texturing affects very significantly on SG system detectability. It seems to be recommended to select for SG embedding such images, which have large texture level. But on the other side it can be looking suspiciously with point of steganographic usage view. Maybe it is better to embed the amount of secret bits depending on the level of image texture. 4. Trellis codes for SG embedding with additional ability to correct errors As we can see from the previous material, the TC with the use of GVA can be effectively used in order to minimise the detectability of SG. However this approach has a significant defect. Even if a single error occurs on the SG it results in corruption of up to t information bits. Moreover these errors can be generated by an attacker who even may ignore whether hidden information is presented or absent on the testing SG but he tries to remove it at extreme case (like a proverbial watch handle rotation at US custom service during the Second World War). Thus it would be interesting to correct some errors while keeping an ability to minimise stegosystem detection. Let us try to design encoding and decoding procedures for TC which would be able to solve this problem. The trellis code in our case can be described by a sequence of states and by a transition function depending on the embedding symbols: where i {,,k}, s i is the i-th TC state, Y i = [y (i-)n+,,y in ], where N =, n is the number of cover object (CO) bits, m i is the i-th embedding bit, and k is the total number of information bits to be embedded. In order to explain the requirements for function g we collect them in the Table 7 depending on the goals of encoding. Table 7. Main requirements for function g. (2)

11 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm Encoding goals Ordinary embedding by trellis code for error correcting only. Embedding of information bit in CO with minimisation of weight. A combination of both embedding with minimal weight and correction of some errors. Main requirements for g For each information bit m i there comes only one path Y i from each state. All other paths are prohibited. For each transition path on the trellis code there exist a set of transition paths Y i. No path is prohibited. For each state of the trellis code, there exists a set of allowed transitions but a part of the paths is prohibited. In general it is possible to devise a code that has correcting capabilities as well as the ability to optimise embedding of weighted cost based on any state diagram that satisfy the four conditions given later in this section. We consider a state diagram that is constructed from submatrix using the following equation: where s i, s i- are the binary representation of the integer numbers from to 2 t -, r is the operation of reversing the vectors, T is the transposition operation and LB is the function of the last bit keeping for vector argument. All operations in (3) are performed as bitwise modulo 2. (Such choice of state diagram is in line with the geometrical definition of the TC given in [Filler et al. (23)].) In order to get a trellis code which allows to minimise a detectability of SG and simultaneously to correct some errors, the assignment Y i = g(s i-,m i ) must satisfy the following conditions: () At least two paths corresponding to embedding and should steam from each state. (2) It should be more than one path on average steaming from each state for embedding of the same information bit. (3) At least one path is coming into each state. (4) Some vectors Y i should be prohibited. (Let us denote by P dis the ratio of the number of allowed vectors to the number of all possible vectors Y i.) The TC, satisfying the above conditions can be constructed as follows: Consider the TC with the use of the step-wise sliding matrix based on the submatrix as described above. Remove a part of transitions randomly with probability P dis. Check whether the conditions () and (3) are satisfied or not. If it occurs that the conditions are not satisfied, then repeat randomly the removal of transitions with probability P dis. We define the full weight of corruption after embedding into CO as: (3) (4) where X i = [x (i-)n+,,x in ], N =, P i = [ρ (i-)n+,,ρ in ], Y (k) = i= k and T is the symbol of transposition. (We note that X i denotes the string of CO bits in which is embedded the information bit m i.) By substituting (2) into (4),

12 2 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin (5) with s (k) = i= k-. Evidently, every term in (5) depends only on the preceding one. Thus we can use GVA for Λ k minimisation as follows: Step. Find all those Y and corresponding states s which allow to embed the first bit m, in line with the given function: Y = g(s,m ), s = g (s,m ) and Y 2 = g(s,m 2 ). Find Ŷ (Y 2 ) = arg min Y (Y 2) Λ 2 where Λ 2 is given as (4), with k = 2. Step 2. Find all those Ŷ 2 (Y 3 ) which allow to embed the second bit m 2, and select thereafter those ones minimising Ŷ 2 (Y 3 ) = arg min Y 2(Y 3) Λ 3 where Λ 3 is given as (4), with k = 3. Step k -. Find all those Ŷ k- (Y k ) which allow to embed the (k-)-th bit m k-, and select thereafter those ones minimising Ŷ k- (Y k ) = arg min Y k-(y k) Λ k where Λ k is given as (4). Step k. Find all those Ŷ k which allow to embed the k-th bit m k, and select thereafter those ones minimising Ŷ k = arg min Y k Λ k. The decoding procedure with error correction can be performed as conventional VA: Let us introduce two functions which can be considered as the inverse functions in (2) Let us denote by Ŷ i the vector Y i after passing through the channel with errors. Then it is necessary to minimise the following function during decoding: (6) (7) where is the Hamming distance: the number of nonzero elements in a vector. Then by rewriting (7) using (6) the following equation results: (8) From (8), a VA can be used to find a sequence of TC states, 2,, k minimising the function Λ k D (s,s 2,,s k ). Next, the sequence of the embedded bits m, m 2,, m k can be obtained given the sequence of TC states, 2,, k. In Fig. 3 there are presented dependencies of the distortion function D(X,Y ) given by () after different types of embedding algorithms into randomly generated binary sequence X of length n and weights ρ i, randomly chosen as absolute values of Gaussian distributions. We can see from these dependencies that in line with theory the largest distortion function (that is the best detectability) occurs for a scenario without the use of TC. The

13 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 3 minimal distortion provides the use of TC without error correction, while joint minimisation of distortion and error correction occupies intermediate position. Fig. 3. Distortion function D after different embedding methods into randomly generated binary sequence X of length n. In Fig. 4 there are presented the dependencies of error probabilities after decoding for three different embedding algorithms also into randomly generated binary sequence X of length n and randomly chosen weights ρ i against channel symbol probability P. We can see at Fig. 4 that the use of TC for distortion function minimisation only results in significant error expansion just at the channel error probability P., while additional error correction by TC allows to keep acceptable reliability after decoding up to channel error probability P.6. (It is worth to note that by introducing large channel error probabilities, an attack results in a degradation of the CO value, hence it is largely unfit for the attacker.)

14 4 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin Fig. 4. Error probability after decoding for three different embedding algorithms. (TC without error correction has w = 5, t = 2, TC with correction has w = 5,t=2, P dis =.4). By changing the probability P dis on a stage of TC generation, it can be traded off between a minimisation of distortion function (hence a minimisation of SG detection) and the maximisation of error correction after decoding. 5. Conclusion A new generation of stegosystems with the use of trellis code-based embedding is very promising because this approach minimises an embedding impact with the point of view blind SVM-SPAM based steganalysis. This is the so called HUGO project developed recently in [Pevny et al. (2)]. But our main contribution into this direction is to make more clear and to prove rigorously that the use of generalised Viterbi Algorithm is in fact the optimal embedding procedure jointly with trellis codes. Another contribution of ours is an investigation of scenario where TC are used not only for minimisation of SG detectability by SPAM-based steganalysis but also for channel error correction. We proposed generation algorithm for such TC and corresponding to them encoding and decoding algorithms that allow to make a trade off between SG detectability and channel error correcting. It is very important if there exists a threat of blind attack.

15 References Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 5 Bas, P., T. Filler, and T. Pevný (2). Break our steganographic system : the ins and outs of organizing BOSS. In Proceedings of the 3th international conference on Information hiding, IH, Berlin, Heidelberg, pp Springer-Verlag. Filler, T., J. Judas, and J. Fridrich (2). Minimizing embedding impact in steganography using trellis-coded quantization. In Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, pp SPIE Proceedings. Fridrich, J. (29). Steganography in Digital Media: Principles, Algorithms, and Applications (st ed.). New York, NY, USA: Cambridge University Press. Ker, A. D., P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevný (23). Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 3, New York, NY, USA, pp ACM. Korzhik, V. (984). A generalization of Viterbi algorithm on the case of channel model described by additive markov channel. In Proceedings of the VI International Symposium on Information Theory, Part II, Moscow-Tashkent, pp. 9. Korzhik, V. and Y. Lopato (987). Optimal decoding of convolutional codes in channels with additive Markov chain model. Problems of Information Transmission XXIII(6), pp Pevný, T., P. Bas, and J. Fridrich (2, June). Steganalysis by subtractive pixel adjacency matrix. Information Forensics and Security, IEEE Transactions on 5(2), Pevný, T., T. Filler, and P. Bas (2). Using high-dimensional image models to perform highly undetectable steganography. In Proceedings of the 2th International Conference on Information Hiding, IH, Berlin, Heidelberg, pp Springer-Verlag.

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia 216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Optimizing Pixel Predictors for Steganalysis

Optimizing Pixel Predictors for Steganalysis Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Quantitative and Binary Steganalysis in JPEG: A Comparative Study

Quantitative and Binary Steganalysis in JPEG: A Comparative Study Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

A New Statistical Restoration Method for Spatial Domain Images

A New Statistical Restoration Method for Spatial Domain Images A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,

More information

Modern Steganalysis Can Detect YASS

Modern Steganalysis Can Detect YASS Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],

More information

Defining Cost Functions for Adaptive Steganography at the Microscale

Defining Cost Functions for Adaptive Steganography at the Microscale Defining Cost Functions for Adaptive Steganography at the Microscale Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu CAS Key Laboratory of Electromagnetic Space Information University of Science and

More information

Steganalysis in the Presence of Watermarked Images

Steganalysis in the Presence of Watermarked Images 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Steganalysis in the Presence of Watermarked Images Pham Hai Dang Le, Daniel Graf, and Matthias O.

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

Detection of Stegosystems Using Block Ciphers for Encryption of the Embedded Messages

Detection of Stegosystems Using Block Ciphers for Encryption of the Embedded Messages Detection of Stegosystems Using Block Ciphers for Encryption of the Embedded Messages Valery Korzhik, Ivan Fedyanin, guyen Duy Cuong The Bonch-Bruevich Saint-Petersburg State University of Telecommunications

More information

On dangers of cross-validation in steganalysis

On dangers of cross-validation in steganalysis Jan Kodovský jan.kodovsky@binghamton.edu Abstract Modern steganalysis is a combination of a feature space design and a supervised binary classification. In this report, we assume that the feature space

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

High capacity data hiding scheme based on (7, 4) Hamming code

High capacity data hiding scheme based on (7, 4) Hamming code DOI 10.1186/s40064-016-1818-0 RESEARCH Open Access High capacity data hiding scheme based on (7, 4) Hamming code Zekun Cao 1, Zhaoxia Yin 1,2*, Honghe Hu 1, Xiangping Gao 1 and Liangmin Wang 1 *Correspondence:

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

arxiv: v1 [cs.mm] 2 Mar 2017

arxiv: v1 [cs.mm] 2 Mar 2017 This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography

Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Alpha-trimmed Image Estimation for JPEG Steganography Detection

Alpha-trimmed Image Estimation for JPEG Steganography Detection Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,

More information

A Study on Different JPEG Steganograhic Schemes

A Study on Different JPEG Steganograhic Schemes A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

STEGANOGRAPHY is a technique for covert communication,

STEGANOGRAPHY is a technique for covert communication, This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TCSVT.206.2587388,

More information

Compression of Stereo Images using a Huffman-Zip Scheme

Compression of Stereo Images using a Huffman-Zip Scheme Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

International Journal of Innovative Research in Computer and Communication Engineering

International Journal of Innovative Research in Computer and Communication Engineering Data Hiding Using Difference Expension Method YASMEEN M.G,RAJALAKSHMI G Final year M.E, Arunai Engineering College, Thiruvannamalai, Tamilnadu, India Assistant Professor, Arunai Engineering College,Thiruvannamalai,

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

Some Algebraic (n, n)-secret Image Sharing Schemes

Some Algebraic (n, n)-secret Image Sharing Schemes Applied Mathematical Sciences, Vol. 11, 2017, no. 56, 2807-2815 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2017.710309 Some Algebraic (n, n)-secret Image Sharing Schemes Selda Çalkavur Mathematics

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

Selection-Channel-Aware Rich Model for Steganalysis of Digital Images

Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Tomáš Denemark, Vahid Sedighi, Vojtěch Holub Department of ECE Binghamton University Binghamton, NY 13902-6000 {tdenema1,vsedigh1}@binghamton.edu

More information

Ivans Lubenko & Andrew Ker

Ivans Lubenko & Andrew Ker Ivans Lubenko & Andrew Ker lubenko@ comlab.ox.ac.uk adk@comlab.ox.ac.uk Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 25 January 2011 Classification in steganalysis

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

The Fibonacci hypercube

The Fibonacci hypercube AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Multibit Embedding Algorithm for Steganography of Palette-Based Images

Multibit Embedding Algorithm for Steganography of Palette-Based Images Multibit Embedding Algorithm for Steganography of Palette-Based Images Shoko Imaizumi and Kei Ozawa Graduate School of Advanced Integration Science, Chiba University 1 33 Yayoicho, Inage-ku, Chiba-shi,

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level

More information

A Formula Diamond Encoding Data Hiding Scheme

A Formula Diamond Encoding Data Hiding Scheme Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo

More information

Space Filling Curves in Steganalysis

Space Filling Curves in Steganalysis Space Filling Curves in Steganalysis Andreas Westfeld Technische Universität Dresden, 01062 Dresden, Germany ABSTRACT We introduce a new method to increase the reliability of current steganalytic techniques

More information

Viterbi Algorithm for error detection and correction

Viterbi Algorithm for error detection and correction IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: 2278-2834-, ISBN: 2278-8735, PP: 60-65 www.iosrjournals.org Viterbi Algorithm for error detection and correction Varsha P. Patil

More information

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes Multimed Tools Appl (2016) 75:13557 13583 DOI 10.1007/s11042-015-2759-2 Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes Xiangyang Luo 1,2 & Xiaofeng Song 1,2

More information

Steganographic Key Leakage Through Payload Metadata

Steganographic Key Leakage Through Payload Metadata Steganographic Key Leakage Through Payload Metadata Tomáš Pevný Agent Technology Group CTU in Prague Prague 16627, Czech Republic pevnak@gmail.com Andrew D. Ker Department of Computer Science University

More information

Solutions to Homework 10

Solutions to Homework 10 CS/Math 240: Intro to Discrete Math 5/3/20 Instructor: Dieter van Melkebeek Solutions to Homework 0 Problem There were five different languages in Problem 4 of Homework 9. The Language D 0 Recall that

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,

More information

A General Framework for the Structural Steganalysis of LSB Replacement

A General Framework for the Structural Steganalysis of LSB Replacement A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding

More information

Analysis of Information Hiding Techniques in HEVC.

Analysis of Information Hiding Techniques in HEVC. Analysis of Information Hiding Techniques in HEVC. Multimedia Processing EE 5359 spring 2015 Advisor: Dr. K. R. Rao Department of Electrical Engineering University of Texas, Arlington Rahul Ankushrao Kawadgave

More information

Copy Protection for Multimedia Data based on Labeling Techniques

Copy Protection for Multimedia Data based on Labeling Techniques Copy Protection for Multimedia Data based on Labeling Techniques G.C. Langelaar, J.C.A. van der Lubbe, J. Biemond Department of Electrical Engineering, Information Theory Group Delft University of Technology

More information

Differential Cryptanalysis

Differential Cryptanalysis Differential Cryptanalysis See: Biham and Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag, 1993. c Eli Biham - March, 28 th, 2012 1 Differential Cryptanalysis The Data

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Graphical Interface for Watermarking

Graphical Interface for Watermarking Graphical Interface for Watermarking R. Amiot and M.A. Ambroze Centre for Security, Communications and Network Research Plymouth University, United Kingdom e-mail: info@cscan.org Abstract An application

More information

Multiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging

Multiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging Multiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging Sos S. Agaian* a, Gilbert L. Peterson b and Benjamin M. Rodriguez b a Multimedia and Mobile Signal Processing Laboratory The

More information

GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY

GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY Volume 1, No. 5, December 2010 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY Samir

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

QR Code Watermarking Algorithm based on Wavelet Transform

QR Code Watermarking Algorithm based on Wavelet Transform 2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Digital image steganography using LSB substitution, PVD, and EMD

Digital image steganography using LSB substitution, PVD, and EMD Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra

More information

Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis

Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information

Blur Space Iterative De-blurring

Blur Space Iterative De-blurring Blur Space Iterative De-blurring RADU CIPRIAN BILCU 1, MEJDI TRIMECHE 2, SAKARI ALENIUS 3, MARKKU VEHVILAINEN 4 1,2,3,4 Multimedia Technologies Laboratory, Nokia Research Center Visiokatu 1, FIN-33720,

More information

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

A DWT Based Steganography Approach

A DWT Based Steganography Approach A DWT Based Steganography Approach EE604 Term Paper Instructor: Prof. Sumana Gupta Group No. 1 Group Members Anirudh Kumar Agrawal, 11907098 Pratik Likhar, 11531 Radhika Ravi, 11553 Introduction Image

More information

Application of Data Hiding in Audio-Video Using Advance Algorithm

Application of Data Hiding in Audio-Video Using Advance Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

A Graph-theoretic Model to Steganography on Social Networks

A Graph-theoretic Model to Steganography on Social Networks A Graph-theoretic Model to Steganography on Social Networks Hanzhou Wu 1, Wei Wang 1, Jing Dong 1, Yiliang Xiong 2 and Hongxia Wang 3 1 Institute of Automation, Chinese Academy of Sciences, Beijing 100190,

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

Single Pass Connected Components Analysis

Single Pass Connected Components Analysis D. G. Bailey, C. T. Johnston, Single Pass Connected Components Analysis, Proceedings of Image and Vision Computing New Zealand 007, pp. 8 87, Hamilton, New Zealand, December 007. Single Pass Connected

More information

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Video Watermarking Algorithm Based on the Human Visual System Properties A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com

More information

Modular network SOM : Theory, algorithm and applications

Modular network SOM : Theory, algorithm and applications Modular network SOM : Theory, algorithm and applications Kazuhiro Tokunaga and Tetsuo Furukawa Kyushu Institute of Technology, Kitakyushu 88-96, Japan {tokunaga, furukawa}@brain.kyutech.ac.jp Abstract.

More information

A Steganography method for JPEG2000 Baseline System

A Steganography method for JPEG2000 Baseline System A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract

More information

Viterbi Algorithm - Implementation

Viterbi Algorithm - Implementation Viterbi Algorithm - Implementation Lecture 14 Vladimir Stojanović 6.973 Communication System Design Spring 2006 Massachusetts Institute of Technology Convolutional Codes Adding redundancy 1+D 2 + 0111

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

STEGANALYSIS OF STEGOSTORAGE LIBRARY

STEGANALYSIS OF STEGOSTORAGE LIBRARY t m Mathematical Publications DOI: 10.1515/tmmp-2016-0034 Tatra Mt. Math. Publ. 67 (2016), 99 116 STEGANALYSIS OF STEGOSTORAGE LIBRARY Michala Gulášová Matúš Jókay ABSTRACT. The main goal of this research

More information

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN E. E. Varsaki, V. Fotopoulos and A. N. Skodras Digital Systems & Media Computing Laboratory School of Science and Technology, Hellenic

More information

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.

More information

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

On the performance of turbo codes with convolutional interleavers

On the performance of turbo codes with convolutional interleavers University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 5 On the performance of turbo codes with convolutional interleavers Sina

More information

YET Another Steganographic Scheme (YASS) [1] is a

YET Another Steganographic Scheme (YASS) [1] is a 374 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 An Experimental Study on the Security Performance of YASS Fangjun Huang, Member, IEEE, Jiwu Huang, Senior Member,

More information

Vol. 1, Issue VIII, Sep ISSN

Vol. 1, Issue VIII, Sep ISSN Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,

More information

A generalized precompiling scheme for surviving path memory management in Viterbi decoders

A generalized precompiling scheme for surviving path memory management in Viterbi decoders A generalized precompiling scheme for surviving path memory management in Viterbi decoders Emmanuel BOUTON, Nicolas DEMASSEUX Telecom Paris, E.N.S.T, 46 rue Barrault, 75634 PARS CEDEX 3, FRANCE e-mail

More information

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift 203, Vol.8 No.2, 26-32 Article ID 007-202(203)02-026-07 DOI 0.007/s859-03-0904- Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift CHEN Biao, ZHANG Weiming,2, YU Nenghai.

More information

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010

More information

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6) International Journals of Advanced Research in Computer Science and Software Engineering ISS: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Image Encryption Based on 2D Baker Map and 1D Logistic

More information

Construction C : an inter-level coded version of Construction C

Construction C : an inter-level coded version of Construction C Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very

More information

Robust DWT Based Technique for Digital Watermarking

Robust DWT Based Technique for Digital Watermarking Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information

More information

USING of POLAR CODES in STEGANOGRAPHY

USING of POLAR CODES in STEGANOGRAPHY USING of POLAR CODES in STEGANOGRAPHY I.DIOP, S.M.FARSSI, B.DIOUF Polytechnic school of Cheikh Anta Diop University Dakar Senegal idydiop@yahoo.fr, farsism@yahoo.com Abstract In this paper, we propose

More information

Advanced Video Coding: The new H.264 video compression standard

Advanced Video Coding: The new H.264 video compression standard Advanced Video Coding: The new H.264 video compression standard August 2003 1. Introduction Video compression ( video coding ), the process of compressing moving images to save storage space and transmission

More information