1,816 Hits in 3.8 sec

EasyStego: Robust Steganography Based on Quick-Response Barcodes for Crossing Domains

Zhenhao Luo, Wei Xie, Baosheng Wang, Yong Tang, Qianqian Xing
2019 Symmetry  
Compared with the best current steganography scheme based on barcodes, EasyStego has greater steganographic capacity and less impact on barcode data.  ...  In the case of adding natural textures and importing quantitative error bits, other related steganography techniques fail, whereas EasyStego can extract secret messages with a success rate of nearly 100%  ...  Acknowledgments: This study was financially supported by a project of the National Key R and D Program of China under Grant 2017YFB0802300 Conflicts of Interest: The authors declare no conflict of interest  ... 
doi:10.3390/sym11020222 fatcat:rwmezhp66zbmxegz2ebk2x2m2u

Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection

Yue Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu
2019 IEEE Access  
To solve the above problems, this paper proposes a spatial image adaptive steganography algorithm based on Zernike moment to resist scaling attack and statistic detection.  ...  the scaling attacks; moreover, compared with the steganography algorithm based on quantization index modulation, the proposed algorithm has higher detection resistance.  ...  Based on the above research, the paper analyzes the scaling invariance of the Zernike moment, and proposes a spatial image adaptive steganography algorithm based on Zernike moment to resist scaling attack  ... 
doi:10.1109/access.2019.2900286 fatcat:sidgwedoevgt7fjm6o6ev2zvuu

Robust adaptive steganography based on dither modulation and modification with re-compression [article]

Zhaoxia Yin, Longfei Ke
2021 arXiv   pre-print
In addition, we add additional check codes to further reduce the average extraction error rate based on the framework of E-DMAS (Enhancing Dither Modulation based robust Adaptive Steganography).  ...  Traditional adaptive steganography is a technique used for covert communication with high security, but it is invalid in the case of stego images are sent to legal receivers over networks which is lossy  ...  Acknowledgments This research work is partly supported by National Natural Science Foundation of China (61872003, U1636206). References  ... 
arXiv:2007.08301v2 fatcat:i7hj3sjprvftrpv5hlfhm7udje

Challenges in Multi-Layer Data Security for Video Steganography Revisited

Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad
2018 Asia-Pacific Journal of Information Technology and Multimedia  
The cryptography algorithms add one layer of security on steganography algorithms and error correction codes improves the robustness of steganography algorithms.  ...  To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography algorithms.  ...  Meanwhile, the error correction code (ECC) has been hybridized with steganography algorithm to achieve a multi-layer data security system robust against varied attacks and noise factor.  ... 
doi:10.17576/apjitm-2018-0702(02)-05 fatcat:mhk24mnajreldpyhp4q27yddee

Enhancing data transfer architecture using LSB steganography combined with reed solomon code

H A. Jassim, Z K. Taha, M A. Alsaedi, B M. Albaker
2018 International Journal of Engineering & Technology  
Further, Forward error correcting code is used to improve the system performance. In the proposed system, the cover image is a gray image and the wavelet transform is applied directly.  ...  The combination between the ciphering process and steganography gives the system high level of security. This idea makes unauthorized retrieval is difficult.  ...  Stego systems incorporating forward error correcting codes are proposed and described in this research.  ... 
doi:10.14419/ijet.v7i2.29.13119 fatcat:jktalyjnxffb7hihscawz4otpm

A Modification-Free Steganography Method Based on Image Information Entropy

Xia ShuangKui, Jianbin Wu
2018 Security and Communication Networks  
In order to improve the security and robustness of the Information Steganography Algorithm under strictly controlled environment, a new algorithm of modification-free steganography based on image and big  ...  At the same time, turbo code is introduced in order to improve robustness, the hot image comes from Internet image big data, and the library of hot image is established.  ...  Acknowledgments This work was supported by the Natural Science Foundation of China and China General Technology Research Institute (U1736121).  ... 
doi:10.1155/2018/6256872 fatcat:bbdldzqtgfaxhpb6n6ug36j6ky

A novel method of speech information hiding based on 3D-Magic Matrix [article]

Zhongliang Yang, Xueshun Peng, Yongfeng Huang, Chinchen Chang
2018 arXiv   pre-print
A cyclically moving algorithm to construct a 3D-Magic matrix for steganography is proposed in this paper, as well as an embedding and an extracting algorithm of steganography based on the 3D-Magic matrix  ...  Based on multiple vector quantization characteristics of the Line Spectrum Pair (LSP) of the speech codec, this paper proposes a steganography scheme using a 3D-Magic matrix to enlarge capacity and improve  ...  Fang Zhao Wu (Xueshun Peng's senior schoolfellow) provides language help during the research.  ... 
arXiv:1809.03010v1 fatcat:stw7ikmiqfh6zbmnmicvzoqu6e

Research on a Robust Method for Image Steganography Transmission in Network

Yiran Wang
2014 Open Automation and Control Systems Journal  
The research has a certain reference value and guiding significance for image steganography.  ...  In order to prevent the loss of packet or frame, we advance a robust data hiding method which can use paired-coefficient and BCH code to recover error bit.  ...  But there are less relevant research on testing their performance. Now, Video Steganography is one of the hottest research fields.  ... 
doi:10.2174/1874444301406011176 fatcat:goku73fi6zaizhev2viplvmdb4

A Compression Resistant Steganography Based on Differential Manchester Code

Shuai Wang, Ning Zheng, Ming Xu
2021 Symmetry  
Additionally, a distortion function and a weighted cost adjustment method are designed to assign an appropriate cost to each candidate DCT coefficient.  ...  In the field of image steganography research, more and more attention is paid to the importance of stego image robustness.  ...  . • TCM method [19] : In this method, the authors devised a steganographic method based on matching channels.  ... 
doi:10.3390/sym13020165 fatcat:oxmsgrod5fdjxh2pthw2nvle2e

JPEG Compression Steganography & Crypography Using Image-Adaptation Technique

Meenu Kumari, A. Khare, Pallavi Khare
2010 Journal of Advances in Information Technology  
The central task is to research available steganography and encryption algorithms to pick the one the offer the best combination of strong encryption, usability and performance.  ...  This paper is a combination of steganography and encryption algorithms, which provides a strong backbone for its security.  ...  ACKNOWLEDGEMENT The work on this paper was supported by the Bharati Vidyapeeth University & College of Engineering, Pune.  ... 
doi:10.4304/jait.1.3.141-145 fatcat:qsnebew7azfytmy2zptyowpse4

Data Hiding using Graphical Code based Steganography Technique

Debajit Sensarma, Samar Sen Sarma
2015 International Journal of Engineering Trends and Technoloy  
In this paper, a new steganography technique has been proposed using Graphical codes and also comparison with steganography technique using BCH codes has been studied.  ...  Among them image steganography is a very attractive research area. The goal is to transmit a data within a modified image (called stego-image)by minimizing the number of bit flips.  ...  ERROR CORRECTING CODES IN STEGANOGRAPHY One important kind of steganography protocol can be defined from coding theory point of view.  ... 
doi:10.14445/22315381/ijett-v27p225 fatcat:melobrm2p5anvcwugzteddesq4

A Modified Product Code Over in Steganography with Large Embedding Rate

2016 KSII Transactions on Internet and Information Systems  
The way of combination of Product Perfect Codes (PPCs) is based on the theory of short codes constructing long codes.  ...  PPCs have larger embedding rate than Hamming codes by expending embedding columns in a coding block, and they have been proven to enhance the performance of the steganographic method.  ...  . reflects the error-correcting ability of -Hamming code.  ... 
doi:10.3837/tiis.2016.07.027 fatcat:vjkgohmyyffgvl3v2je3hclroy

Image steganography with using QR code and cryptography

Vladimir Hajduk, Martin Broda, Ondrej Kovac, Dusan Levicky
2016 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA)  
This paper is focused on proposal of image steganographic method that is able to embedding of encoded secret message using Quick Response Code (QR) code into image data.  ...  In addition, typical characteristics of QR code was broken using the encryption, therefore it makes the method more secure.  ...  Steganalysis is utilized to detect the subliminal channels established by steganography. These methods are based on the strong complex mathematical calculations.  ... 
doi:10.1109/radioelek.2016.7477370 fatcat:v4dhxlbsgncbrpcxsh7iipqliu

Spread spectrum image steganography

L.M. Marvel, C.G. Boncelet, C.T. Retter
1999 IEEE Transactions on Image Processing  
In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS).  ...  Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated.  ...  For SSIS proof-of-concept, binary expansions of Reed-Solomon codes with a decoder based on a simple idea of Bossert and Hergert [25] using low-weight parity checks were used for error correction.  ... 
doi:10.1109/83.777088 pmid:18267522 fatcat:jzwxob5nbrf4lpbojewv2a6wpq


Andrii Astrakhantsev, Galyna Liashenko, Anna Shcherbak
2020 Information and Telecommunication Sciences  
For noise resistance different error correction codes are implemented.  ...  Methods.  ...  Based on the multi-criteria analysis [2, 4] , the best authentication methods for research were selected (Fig. 1) .  ... 
doi:10.20535/2411-2976.22020.38-43 fatcat:bkwxvzyta5adnnonesvzu7nrhi
« Previous Showing results 1 — 15 out of 1,816 results