DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM *
|
|
- Lynn Brown
- 5 years ago
- Views:
Transcription
1 International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 3, No. 2, pp. 5, 26 DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM * VALERY KORZHIK State University of Telecommunications, St. Petersburg, Russia val-korzhik@yandex.ru GUILLERMO MORALES-LUNA Computer Science, CINVESTAV-IPN, Mexico City, Mexico gmorales@cs.cinvestav.mx IVAN FEDYANIN State University of Telecommunications, St. Petersburg, Russia ivan.a.fedyanin@gmail.com One of the most promising direction in the design of high speed stegosystem was project HUGO based on the use of trellis codes (TC) and Viterbi Algorithm(VA) in the embedding procedure. However the optimality of VA was kept still unclear because a generic purpose of VA is to correct errors.we prove that optimality of embedding can be achieved with the use of generalised Viterbi algorithm(gva) proposed by one of the authors of this paper about 3 years ago. Optimisation of the trellis code check matrix based on the use of GVA is also considered. The second goal of the current paper is to consider to use TC jointly with GVA in order to provide both security of a stegosystem and simultaneously their ability to correct errors which can be induced by an attacker in order to remove embedded information even in the case if the attacker is unable to detect a presence of hidden information (blind attack). We consider also a trade off between security and error correction. Experimental results show that it is possible to build a stegosystem with acceptable errorcorrection capabilities together with minimization of the embedding impact. Keywords: Error correction, generalised Viterbi algorithm, HUGO project, images, stegosystem, trellis codes.. Introduction Steganography (SG) is the information hiding technique that embeds the hidden information into an innocent cover object (CO) under conditions that CO is not corrupted significantly and that a presence of the additional information in CO may not be detected. This goal entails an obvious requirement: the embedding impact has to be minimised from the steganalysis point of view. Moreover, it does not mean that the number of
2 2 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin changes into CO just after embedding should be minimized because the change weights may differ, hence a minimisation of changes into CO does not necessary results in a minimisation of SG detectability. Let X n n 2 be a grey scale cover image and let Y n n 2 be the resulting image after embedding using some stego-algorithm. Let D(X,Y ) be the distortion of the stegoimage and the cover image, in the sense of ability of the SPAM stegoalgorithm to distinguish X and Y. Up to an enumeration of the pixel arrays, the images can be regarded as linear arrays of length n = n n 2. The additive distortion function chosen for Highly Undetectable stego (HUGO) algorithm [Pevný et al. (2)] is () where, ρ i + {+ } is the weight coefficient (the cost of changing the i-th pixel), x i,y i are the values of the i-th pixel at X and Y respectively. All changes are restricted to ± increments, so that the following inequality holds after ±-embeddings in LSB: The additive form of () means that detectability of SG does not depend on the correlation between the embedded bits. That assumption holds when the changed pixels are located sufficiently far from each other, which in turn holds when the embedding rate is relatively low. Three problems arise in the design of effective SG: () How to choose adequately the weights i= n? (2) What is the best coding method for changing pixels according to their weights? (3) How to correct errors caused by blind attack jointly with effective SG detecting? In order to find the pixel weights to be used at (), for each i {,,n}, let Y (i) be the image X with the i-th pixel changed. Then, j {,,n} : x j - y j (i). Let us pick ρ i = D(X,Y (i) ). The weight D(X,Y ) can be calculated as proposed in [Pevny et al. (2)], as the addition of two sums: where the map C dd2 k is calculated, in line with the SPAM features, as the Markov transition probabilities for the eight directions at U V, with In particular, for the case of the horizontal direction ( ), for any integers d,d 2 [-T,T]:
3 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 3 (3) where for i n and j n 2 -, D i,j = X i,j - X i,j+. As in [Pevny et al. (2)], we consider a weight function of the form: for some optimised parameters σ > and γ >. It is well known [Fridrich (29)] that in order to minimise the number of changes among pixels of the CO, a syndrome coding may be used: (5) where y is the block of stego-image bits of length n = n n 2, m is a block of information bits of length k that should be embedded into y and H is a (k n)-matrix chosen for encoding. Next, among all the solutions y, for given m and H, it is necessary to select those providing minimum number of changes between y and its CO block x. At [Fridrich (29)], a technique to solve this problem was presented, and it is especially simple for the Hamming code with a specific check matrix H. But in our case it is necessary to minimise not the number of changes in CO but the distortion function D : (X,Y ) D(X,Y ) given by (). It seems to be similar to a transition from hard decoding to soft decoding in communications where trellis codes using Viterbi algorithm for decoding can be more favourable than block codes, using some algebraic decoding algorithms. Nevertheless there exists a significant difference in the solution of the matrix equation (5) with respect to y given m with minimising the distortion function D given x as a CO and the solution of the error correction procedure equation Hm = y, given some distance between y and x. Fortunately, there exists the so called Generalised Viterbi Algorithm (GVA) proposed in 984 [Korzhik (984), Korzhik and Lopato (987)] that is able to describe both error correction and also steganographic embedding problem in analytic form without execution on trellis graphs. This method of stegosystem design based on trellis codes and GVA becomes clearer and gets a strict justification. We describe GVA and its application to steganographic problem design in the Section 2. Results of matrix optimisation, which are obtained by simulation with the use of GVA, are presented in Section 3. In Section 4 it is considered a combination of TC and GVA in order to minimise both SG detectability and simultaneously to correct errors caused by blind attack. Section 5 concludes the paper. 2. Application of GVA to the SG system design problem Let us initially state a problem that results in a natural solution within GVA [Korzhik (984), Korzhik and Lopato (987)]. Problem. Find where (4) (6)
4 4 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin ν N -, each entry x j is in the set X, card = r, and λ is a real function defined on the set of finite length real sequences. Here, the goal at (6) is to minimise the function, but it can be used to maximise the function, as well. The stated problem can be solved through the so called GVA introduced at [Korzhik and Lopato (987)]: () Find = argmin x Λ ν+ (x,x 2,,x ν+ ). (2) Find 2 = argmin xs Λ ν+2 (,x 2,,x ν+2 ). (3) (4) Find s = argmin xs Λ ν+2 (,, s-,x s,,x ν+s ). (5) (6) Find ( N-ν,, N) = argmin (xn-ν,,xn)λ ν+2 ( N), where N = (,, N-ν-,x N-ν,,x ν+s ) It is easy to see that for all steps, except the last one, the number of calculations for every argument is at most r ν+ and the last step requires at most r ν operations. We note that the conventional VA is a particular case of GVA with ν =. Then: (7) If we assume now that each x k in (7) is the state of trellis on the k-th step and λ(x k,x k+ ) is the length of branch from the state x k to the state x k+, then the decoding problem for convolutional code presented by trellis diagram is equivalent to a minimisation of (6). But fortunately, GVA can be used also for a situation of embedding problem for SG given by (5) that seems to be at a single glance completely different than correction of errors by convolutional codes. Let us consider a matrix H in (5) that has the step-wise sliding form based on a submatrix of order t w pictured at Fig.. Fig.. H as a step-wise sliding matrix..
5 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 5 In order to simplify further the description, let us consider the particular case of t = 2, w = 2, and = i,j 2. Let us assume also k >, and n = 2k. Then equation (5) can be written as follows: (8) with y = T, m = T, determining the equation system (9) It is possible to apply GVA to solve the system (9) given the column vector m and x providing a minimisation of the weight This algorithm can be performed through the following steps: () Build the Table of variants (ŷ,ŷ 2 ) for all possible tuples (y 3,y 4 ) satisfying equation (9), for j = 2, and minimise the function where ρ(x i,y i ) = ρ i x i - y i. (2) Build the Table of variants (ŷ 3,ŷ 4 ) for all possible tuples (y 5,y 6 ) satisfying equation (9), for j = 3, and minimise the function where ρ(x i,y i ) = ρ i x i - y i. Proceed similarly up to the last equation at (9). Example. Let k = 3, ρ i = for i =,,6, x = and m =. Then the matrix H is
6 6 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin In line with (8) we have () () In order to satisfy the first equation in (9) we get two possibilities (y,y 2 ) = (,), and (y,y 2 ) = (,). (2) For all possible pairs (y 3,y 4 ) and (y,y 2 ) which are obtained in the Step ) we get the possibilities to satisfy the second equation in (9) shown at Table. Table. Illustration for step y y 2 y 3 y (*) 4 * * * * (*) Left side of the second equation in (9) Asterisk means that left side of the second equation of (9) coincides with m 2 =. Table. Values of Λ. In Table there are presented also the calculation results of the values Λ for survived strings (with an asterisk). Next in Table 2 we present all possible pairs (y 3,y 4 ) satisfying to the corresponding equation in (9) for every pair (y 5,y 6 ). Table 2. Admissible tuples (y,y 2,y 3,y 4 ). y 3 y 4 y 5 y 6
7 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 7 By combining the Tables and 2, we get Table 3 presenting all possible(y,y 2,y 3,y 4 ) tuples for every pair (y 5,y 6 ) and corresponding to them, the values Λ 3. Table 3. Values of Λ 3. y y2 y3 y4 y 5 y Now it is possible to minimise Λ 3 by selecting a pair (y 5,y 6 ). This gives two optimal tuples y = and y =. It is easy to see that each of these tuples requires one change of the tuple x and satisfies the equation (). This approach can be extended to any step-wise matrix generated by shifting the (t w)- submatrix. Then the complexity for GVA will be of the order O(kwt2 wt ) with respect to operations. 3. Optimisation of by simulation with GVA Let us consider initially the case with ρ i =, for i =,,n. This means that we try to minimise the number of changes into the image pixels after embedding against the sizes t and w of a randomly chosen submatrix. The results of simulation for randomly chosen CO are shown in Fig. 2 where relative changes are presented on the vertical axis.
8 8 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin (a) (b) Fig. 2. Relative changes of randomly chosen binary sequence of length 5 as CO after embedding based on trellis codes. (a) Against the matrix parameter t given w, and (b) against the matrix parameter w given t. From Fig. 2 it can be seen that it is sufficient to bound the sizes of the submatrix 5, w, at least for the case ρ i =, for i =,,n. as t But it is more interesting to investigate the undetectability of SG based on trellis embedding into real images under the condition that the SG detection is performed by blind SVM-based steganalysis with the use of SPAM features (see (2)-(4)). The experiment has been arranged as follows: The image base was taken similar to those considered in [Bas et al. (2)]. Since the embedding procedure is very time-consuming the images were reduced to lesser sizes. The weight coefficients ρ ij in () were calculated by (2), (3) with the weight function (4) after optimisation of parameters σ and γ. At the
9 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 9 training SVM stage both 5 images with and without embedding were used. During the testing SVM stage, there were executed 5 images with and without embedding. This HUGO-based algorithm was compared with conventional ± embedding algorithm taken with the same embedding rate R =, where k is the number of embedded bits and n is the number of image pixels. As a criterion of stegosystem undetectability, it was used (in line with a recommendations [Pevný et al. (2)]) the averaged error probability P e = where P m is the probability of SG missing and P fa is the probability of SG false alarm. The value P e has been minimised at the cost of SVM threshold optimisation. The results of simulations are shown in Tables 4 and 5. Table 4. The probabilities of incorrect ± SG system detection (P e ) for different image sizes and embedding rates R. Image size P e Embedding rate k / n 6x x x x x Table 5. The probabilities of incorrect HUGO SG system SPAM-based detection (P e ) for different image sizes and embedding rates R Image size Embedding SPAM parameters P e rate k / n T 6x x x x We can see from these Tables that the use of the HUGO trellis code-based SG offers some advantages in undetectabilities against a conventional ± in LSB embedding SG. It is worth to note that the undetectability of SG, even in the case of a trellis code-based embedding (used with the HUGO project), depends significantly on the image texturing. We have found that the greater is the degree of texture, the most frequent undetectability of the corresponding image. Qualitatively, image texturing means that the image has a presence of precise contours, while not texture images have sliding luminance changing and noisy background. Numerically image texture can be estimated by the parameter [Pevný et al. (2)] () where B ij k is a (2 2)-pixel block with (i,j)-coordinates and k is the k-th pixel of this block. As it can be seen by (), in order to calculate a measure of image texture t n it is
10 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin necessary to divide the image on disjoint (2 2)-blocks and next to calculate for every block the difference between maximum and minimum pixel luminance of this block. In Table 6 there are presented the averaged error detecting probabilities for HUGO-based SG after embedding of messages into the images with different texturing. For both SVM training and testing phases 5 images from different image sets were used. Table 6. The error detecting probabilities for HUGO-based SG after embedding of messages into the images with different texturing. Image t Embedding SPAM parameters n P e size rate k / n T 64x64 < x64 > We can see from this Table that, in fact, the level of image texturing affects very significantly on SG system detectability. It seems to be recommended to select for SG embedding such images, which have large texture level. But on the other side it can be looking suspiciously with point of steganographic usage view. Maybe it is better to embed the amount of secret bits depending on the level of image texture. 4. Trellis codes for SG embedding with additional ability to correct errors As we can see from the previous material, the TC with the use of GVA can be effectively used in order to minimise the detectability of SG. However this approach has a significant defect. Even if a single error occurs on the SG it results in corruption of up to t information bits. Moreover these errors can be generated by an attacker who even may ignore whether hidden information is presented or absent on the testing SG but he tries to remove it at extreme case (like a proverbial watch handle rotation at US custom service during the Second World War). Thus it would be interesting to correct some errors while keeping an ability to minimise stegosystem detection. Let us try to design encoding and decoding procedures for TC which would be able to solve this problem. The trellis code in our case can be described by a sequence of states and by a transition function depending on the embedding symbols: where i {,,k}, s i is the i-th TC state, Y i = [y (i-)n+,,y in ], where N =, n is the number of cover object (CO) bits, m i is the i-th embedding bit, and k is the total number of information bits to be embedded. In order to explain the requirements for function g we collect them in the Table 7 depending on the goals of encoding. Table 7. Main requirements for function g. (2)
11 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm Encoding goals Ordinary embedding by trellis code for error correcting only. Embedding of information bit in CO with minimisation of weight. A combination of both embedding with minimal weight and correction of some errors. Main requirements for g For each information bit m i there comes only one path Y i from each state. All other paths are prohibited. For each transition path on the trellis code there exist a set of transition paths Y i. No path is prohibited. For each state of the trellis code, there exists a set of allowed transitions but a part of the paths is prohibited. In general it is possible to devise a code that has correcting capabilities as well as the ability to optimise embedding of weighted cost based on any state diagram that satisfy the four conditions given later in this section. We consider a state diagram that is constructed from submatrix using the following equation: where s i, s i- are the binary representation of the integer numbers from to 2 t -, r is the operation of reversing the vectors, T is the transposition operation and LB is the function of the last bit keeping for vector argument. All operations in (3) are performed as bitwise modulo 2. (Such choice of state diagram is in line with the geometrical definition of the TC given in [Filler et al. (23)].) In order to get a trellis code which allows to minimise a detectability of SG and simultaneously to correct some errors, the assignment Y i = g(s i-,m i ) must satisfy the following conditions: () At least two paths corresponding to embedding and should steam from each state. (2) It should be more than one path on average steaming from each state for embedding of the same information bit. (3) At least one path is coming into each state. (4) Some vectors Y i should be prohibited. (Let us denote by P dis the ratio of the number of allowed vectors to the number of all possible vectors Y i.) The TC, satisfying the above conditions can be constructed as follows: Consider the TC with the use of the step-wise sliding matrix based on the submatrix as described above. Remove a part of transitions randomly with probability P dis. Check whether the conditions () and (3) are satisfied or not. If it occurs that the conditions are not satisfied, then repeat randomly the removal of transitions with probability P dis. We define the full weight of corruption after embedding into CO as: (3) (4) where X i = [x (i-)n+,,x in ], N =, P i = [ρ (i-)n+,,ρ in ], Y (k) = i= k and T is the symbol of transposition. (We note that X i denotes the string of CO bits in which is embedded the information bit m i.) By substituting (2) into (4),
12 2 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin (5) with s (k) = i= k-. Evidently, every term in (5) depends only on the preceding one. Thus we can use GVA for Λ k minimisation as follows: Step. Find all those Y and corresponding states s which allow to embed the first bit m, in line with the given function: Y = g(s,m ), s = g (s,m ) and Y 2 = g(s,m 2 ). Find Ŷ (Y 2 ) = arg min Y (Y 2) Λ 2 where Λ 2 is given as (4), with k = 2. Step 2. Find all those Ŷ 2 (Y 3 ) which allow to embed the second bit m 2, and select thereafter those ones minimising Ŷ 2 (Y 3 ) = arg min Y 2(Y 3) Λ 3 where Λ 3 is given as (4), with k = 3. Step k -. Find all those Ŷ k- (Y k ) which allow to embed the (k-)-th bit m k-, and select thereafter those ones minimising Ŷ k- (Y k ) = arg min Y k-(y k) Λ k where Λ k is given as (4). Step k. Find all those Ŷ k which allow to embed the k-th bit m k, and select thereafter those ones minimising Ŷ k = arg min Y k Λ k. The decoding procedure with error correction can be performed as conventional VA: Let us introduce two functions which can be considered as the inverse functions in (2) Let us denote by Ŷ i the vector Y i after passing through the channel with errors. Then it is necessary to minimise the following function during decoding: (6) (7) where is the Hamming distance: the number of nonzero elements in a vector. Then by rewriting (7) using (6) the following equation results: (8) From (8), a VA can be used to find a sequence of TC states, 2,, k minimising the function Λ k D (s,s 2,,s k ). Next, the sequence of the embedded bits m, m 2,, m k can be obtained given the sequence of TC states, 2,, k. In Fig. 3 there are presented dependencies of the distortion function D(X,Y ) given by () after different types of embedding algorithms into randomly generated binary sequence X of length n and weights ρ i, randomly chosen as absolute values of Gaussian distributions. We can see from these dependencies that in line with theory the largest distortion function (that is the best detectability) occurs for a scenario without the use of TC. The
13 Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 3 minimal distortion provides the use of TC without error correction, while joint minimisation of distortion and error correction occupies intermediate position. Fig. 3. Distortion function D after different embedding methods into randomly generated binary sequence X of length n. In Fig. 4 there are presented the dependencies of error probabilities after decoding for three different embedding algorithms also into randomly generated binary sequence X of length n and randomly chosen weights ρ i against channel symbol probability P. We can see at Fig. 4 that the use of TC for distortion function minimisation only results in significant error expansion just at the channel error probability P., while additional error correction by TC allows to keep acceptable reliability after decoding up to channel error probability P.6. (It is worth to note that by introducing large channel error probabilities, an attack results in a degradation of the CO value, hence it is largely unfit for the attacker.)
14 4 Valery Korzhik, Guillermo Morales-Luna, Ivan Fedyanin Fig. 4. Error probability after decoding for three different embedding algorithms. (TC without error correction has w = 5, t = 2, TC with correction has w = 5,t=2, P dis =.4). By changing the probability P dis on a stage of TC generation, it can be traded off between a minimisation of distortion function (hence a minimisation of SG detection) and the maximisation of error correction after decoding. 5. Conclusion A new generation of stegosystems with the use of trellis code-based embedding is very promising because this approach minimises an embedding impact with the point of view blind SVM-SPAM based steganalysis. This is the so called HUGO project developed recently in [Pevny et al. (2)]. But our main contribution into this direction is to make more clear and to prove rigorously that the use of generalised Viterbi Algorithm is in fact the optimal embedding procedure jointly with trellis codes. Another contribution of ours is an investigation of scenario where TC are used not only for minimisation of SG detectability by SPAM-based steganalysis but also for channel error correction. We proposed generation algorithm for such TC and corresponding to them encoding and decoding algorithms that allow to make a trade off between SG detectability and channel error correcting. It is very important if there exists a threat of blind attack.
15 References Design of high speed stegosystem based on trellis codes jointly with generalised Viterbi algorithm 5 Bas, P., T. Filler, and T. Pevný (2). Break our steganographic system : the ins and outs of organizing BOSS. In Proceedings of the 3th international conference on Information hiding, IH, Berlin, Heidelberg, pp Springer-Verlag. Filler, T., J. Judas, and J. Fridrich (2). Minimizing embedding impact in steganography using trellis-coded quantization. In Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, pp SPIE Proceedings. Fridrich, J. (29). Steganography in Digital Media: Principles, Algorithms, and Applications (st ed.). New York, NY, USA: Cambridge University Press. Ker, A. D., P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevný (23). Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 3, New York, NY, USA, pp ACM. Korzhik, V. (984). A generalization of Viterbi algorithm on the case of channel model described by additive markov channel. In Proceedings of the VI International Symposium on Information Theory, Part II, Moscow-Tashkent, pp. 9. Korzhik, V. and Y. Lopato (987). Optimal decoding of convolutional codes in channels with additive Markov chain model. Problems of Information Transmission XXIII(6), pp Pevný, T., P. Bas, and J. Fridrich (2, June). Steganalysis by subtractive pixel adjacency matrix. Information Forensics and Security, IEEE Transactions on 5(2), Pevný, T., T. Filler, and P. Bas (2). Using high-dimensional image models to perform highly undetectable steganography. In Proceedings of the 2th International Conference on Information Hiding, IH, Berlin, Heidelberg, pp Springer-Verlag.
Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia
216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationOptimizing Pixel Predictors for Steganalysis
Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationQuantitative and Binary Steganalysis in JPEG: A Comparative Study
Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationA New Statistical Restoration Method for Spatial Domain Images
A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,
More informationModern Steganalysis Can Detect YASS
Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],
More informationDefining Cost Functions for Adaptive Steganography at the Microscale
Defining Cost Functions for Adaptive Steganography at the Microscale Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu CAS Key Laboratory of Electromagnetic Space Information University of Science and
More informationSteganalysis in the Presence of Watermarked Images
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Steganalysis in the Presence of Watermarked Images Pham Hai Dang Le, Daniel Graf, and Matthias O.
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationDetection of Stegosystems Using Block Ciphers for Encryption of the Embedded Messages
Detection of Stegosystems Using Block Ciphers for Encryption of the Embedded Messages Valery Korzhik, Ivan Fedyanin, guyen Duy Cuong The Bonch-Bruevich Saint-Petersburg State University of Telecommunications
More informationOn dangers of cross-validation in steganalysis
Jan Kodovský jan.kodovsky@binghamton.edu Abstract Modern steganalysis is a combination of a feature space design and a supervised binary classification. In this report, we assume that the feature space
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationHigh capacity data hiding scheme based on (7, 4) Hamming code
DOI 10.1186/s40064-016-1818-0 RESEARCH Open Access High capacity data hiding scheme based on (7, 4) Hamming code Zekun Cao 1, Zhaoxia Yin 1,2*, Honghe Hu 1, Xiangping Gao 1 and Liangmin Wang 1 *Correspondence:
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationarxiv: v1 [cs.mm] 2 Mar 2017
This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationEvolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
More informationA Connection between Network Coding and. Convolutional Codes
A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationAlpha-trimmed Image Estimation for JPEG Steganography Detection
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationSTEGANOGRAPHY is a technique for covert communication,
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TCSVT.206.2587388,
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationDiscrete Optimization. Lecture Notes 2
Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationInternational Journal of Innovative Research in Computer and Communication Engineering
Data Hiding Using Difference Expension Method YASMEEN M.G,RAJALAKSHMI G Final year M.E, Arunai Engineering College, Thiruvannamalai, Tamilnadu, India Assistant Professor, Arunai Engineering College,Thiruvannamalai,
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationSome Algebraic (n, n)-secret Image Sharing Schemes
Applied Mathematical Sciences, Vol. 11, 2017, no. 56, 2807-2815 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2017.710309 Some Algebraic (n, n)-secret Image Sharing Schemes Selda Çalkavur Mathematics
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationSelection-Channel-Aware Rich Model for Steganalysis of Digital Images
Selection-Channel-Aware Rich Model for Steganalysis of Digital Images Tomáš Denemark, Vahid Sedighi, Vojtěch Holub Department of ECE Binghamton University Binghamton, NY 13902-6000 {tdenema1,vsedigh1}@binghamton.edu
More informationIvans Lubenko & Andrew Ker
Ivans Lubenko & Andrew Ker lubenko@ comlab.ox.ac.uk adk@comlab.ox.ac.uk Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 25 January 2011 Classification in steganalysis
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationThe Fibonacci hypercube
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationMultibit Embedding Algorithm for Steganography of Palette-Based Images
Multibit Embedding Algorithm for Steganography of Palette-Based Images Shoko Imaizumi and Kei Ozawa Graduate School of Advanced Integration Science, Chiba University 1 33 Yayoicho, Inage-ku, Chiba-shi,
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More informationSpace Filling Curves in Steganalysis
Space Filling Curves in Steganalysis Andreas Westfeld Technische Universität Dresden, 01062 Dresden, Germany ABSTRACT We introduce a new method to increase the reliability of current steganalytic techniques
More informationViterbi Algorithm for error detection and correction
IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: 2278-2834-, ISBN: 2278-8735, PP: 60-65 www.iosrjournals.org Viterbi Algorithm for error detection and correction Varsha P. Patil
More informationSteganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes
Multimed Tools Appl (2016) 75:13557 13583 DOI 10.1007/s11042-015-2759-2 Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes Xiangyang Luo 1,2 & Xiaofeng Song 1,2
More informationSteganographic Key Leakage Through Payload Metadata
Steganographic Key Leakage Through Payload Metadata Tomáš Pevný Agent Technology Group CTU in Prague Prague 16627, Czech Republic pevnak@gmail.com Andrew D. Ker Department of Computer Science University
More informationSolutions to Homework 10
CS/Math 240: Intro to Discrete Math 5/3/20 Instructor: Dieter van Melkebeek Solutions to Homework 0 Problem There were five different languages in Problem 4 of Homework 9. The Language D 0 Recall that
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationSTEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,
More informationA General Framework for the Structural Steganalysis of LSB Replacement
A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding
More informationAnalysis of Information Hiding Techniques in HEVC.
Analysis of Information Hiding Techniques in HEVC. Multimedia Processing EE 5359 spring 2015 Advisor: Dr. K. R. Rao Department of Electrical Engineering University of Texas, Arlington Rahul Ankushrao Kawadgave
More informationCopy Protection for Multimedia Data based on Labeling Techniques
Copy Protection for Multimedia Data based on Labeling Techniques G.C. Langelaar, J.C.A. van der Lubbe, J. Biemond Department of Electrical Engineering, Information Theory Group Delft University of Technology
More informationDifferential Cryptanalysis
Differential Cryptanalysis See: Biham and Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag, 1993. c Eli Biham - March, 28 th, 2012 1 Differential Cryptanalysis The Data
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationARELAY network consists of a pair of source and destination
158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper
More informationGraphical Interface for Watermarking
Graphical Interface for Watermarking R. Amiot and M.A. Ambroze Centre for Security, Communications and Network Research Plymouth University, United Kingdom e-mail: info@cscan.org Abstract An application
More informationMultiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging
Multiple Masks Based Pixel Comparison Steganalysis Method for Mobile Imaging Sos S. Agaian* a, Gilbert L. Peterson b and Benjamin M. Rodriguez b a Multimedia and Mobile Signal Processing Laboratory The
More informationGENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY
Volume 1, No. 5, December 2010 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY Samir
More informationA Robust Watermarking Algorithm For JPEG Images
nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationDigital image steganography using LSB substitution, PVD, and EMD
Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra
More informationFurther Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis
Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationCHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION
CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant
More informationBlur Space Iterative De-blurring
Blur Space Iterative De-blurring RADU CIPRIAN BILCU 1, MEJDI TRIMECHE 2, SAKARI ALENIUS 3, MARKKU VEHVILAINEN 4 1,2,3,4 Multimedia Technologies Laboratory, Nokia Research Center Visiokatu 1, FIN-33720,
More informationA Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain
A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationA DWT Based Steganography Approach
A DWT Based Steganography Approach EE604 Term Paper Instructor: Prof. Sumana Gupta Group No. 1 Group Members Anirudh Kumar Agrawal, 11907098 Pratik Likhar, 11531 Radhika Ravi, 11553 Introduction Image
More informationApplication of Data Hiding in Audio-Video Using Advance Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationA Graph-theoretic Model to Steganography on Social Networks
A Graph-theoretic Model to Steganography on Social Networks Hanzhou Wu 1, Wei Wang 1, Jing Dong 1, Yiliang Xiong 2 and Hongxia Wang 3 1 Institute of Automation, Chinese Academy of Sciences, Beijing 100190,
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationSingle Pass Connected Components Analysis
D. G. Bailey, C. T. Johnston, Single Pass Connected Components Analysis, Proceedings of Image and Vision Computing New Zealand 007, pp. 8 87, Hamilton, New Zealand, December 007. Single Pass Connected
More informationA Video Watermarking Algorithm Based on the Human Visual System Properties
A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com
More informationModular network SOM : Theory, algorithm and applications
Modular network SOM : Theory, algorithm and applications Kazuhiro Tokunaga and Tetsuo Furukawa Kyushu Institute of Technology, Kitakyushu 88-96, Japan {tokunaga, furukawa}@brain.kyutech.ac.jp Abstract.
More informationA Steganography method for JPEG2000 Baseline System
A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract
More informationViterbi Algorithm - Implementation
Viterbi Algorithm - Implementation Lecture 14 Vladimir Stojanović 6.973 Communication System Design Spring 2006 Massachusetts Institute of Technology Convolutional Codes Adding redundancy 1+D 2 + 0111
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationSTEGANALYSIS OF STEGOSTORAGE LIBRARY
t m Mathematical Publications DOI: 10.1515/tmmp-2016-0034 Tatra Mt. Math. Publ. 67 (2016), 99 116 STEGANALYSIS OF STEGOSTORAGE LIBRARY Michala Gulášová Matúš Jókay ABSTRACT. The main goal of this research
More informationSELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras
SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN E. E. Varsaki, V. Fotopoulos and A. N. Skodras Digital Systems & Media Computing Laboratory School of Science and Technology, Hellenic
More informationOn the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationCh. 7 Error Detection and Correction
Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us
More informationOn the performance of turbo codes with convolutional interleavers
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 5 On the performance of turbo codes with convolutional interleavers Sina
More informationYET Another Steganographic Scheme (YASS) [1] is a
374 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 An Experimental Study on the Security Performance of YASS Fangjun Huang, Member, IEEE, Jiwu Huang, Senior Member,
More informationVol. 1, Issue VIII, Sep ISSN
Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,
More informationA generalized precompiling scheme for surviving path memory management in Viterbi decoders
A generalized precompiling scheme for surviving path memory management in Viterbi decoders Emmanuel BOUTON, Nicolas DEMASSEUX Telecom Paris, E.N.S.T, 46 rue Barrault, 75634 PARS CEDEX 3, FRANCE e-mail
More informationReversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift
203, Vol.8 No.2, 26-32 Article ID 007-202(203)02-026-07 DOI 0.007/s859-03-0904- Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift CHEN Biao, ZHANG Weiming,2, YU Nenghai.
More informationCovert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach
Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010
More informationResearch Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)
International Journals of Advanced Research in Computer Science and Software Engineering ISS: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Image Encryption Based on 2D Baker Map and 1D Logistic
More informationConstruction C : an inter-level coded version of Construction C
Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationUSING of POLAR CODES in STEGANOGRAPHY
USING of POLAR CODES in STEGANOGRAPHY I.DIOP, S.M.FARSSI, B.DIOUF Polytechnic school of Cheikh Anta Diop University Dakar Senegal idydiop@yahoo.fr, farsism@yahoo.com Abstract In this paper, we propose
More informationAdvanced Video Coding: The new H.264 video compression standard
Advanced Video Coding: The new H.264 video compression standard August 2003 1. Introduction Video compression ( video coding ), the process of compressing moving images to save storage space and transmission
More information