A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Discrete Transformations and Noise-Resistant Coding of Still Images in Steganography Problems
2018
This article is another attempt of a comprehensive solution in the field of steganography data transmission. ...
channels with a high level of noise is also shown. ...
Recently, in the field of digital signal transmission in channels with a high level of noise, methods of noisecorrecting coding based on the use of multi-threshold decoders (MTD) of self-orthogonal codes ...
doi:10.24412/1613-0073-2341-12-19
fatcat:3jryb3xvrnawhg7725ylol3tne
Optimum perfect steganography of memoryless sources as a rate-distortion problem
2013
2013 IEEE International Workshop on Information Forensics and Security (WIFS)
Thus steganography of memoryless sources using permutation coding is a rate-distortion problem. ...
Although real host signals are not memoryless, a decorrelating energy-preserving transform can always be applied before a method that assumes a memoryless source, as is usually done in the dual problem ...
Hence steganography of memoryless sources using permutation coding is a rate-distortion problem-insofar as devoid of detectability concerns. ...
doi:10.1109/wifs.2013.6707814
dblp:conf/wifs/BaladoH13
fatcat:xviclyioivdkzgfdmvszmdelvy
The Security of Arithmetic Compression Based Text Steganography Method
2013
International Journal of Electrical and Computer Engineering (IJECE)
arithmetic coding and other methods of text steganography. ...
Security of a modern design of steganography on lossless compression is studied in this paper. ...
One of the problems of arithmetic coding is to generate data out of range. Scaling method has been proposed to overcome this problem, which keeps our data in a logical range [7] . ...
doi:10.11591/ijece.v3i6.4068
fatcat:nmtz326wzffqrizps4fqkm7dqm
A Review on Uniform Embedding For Efficient Jpeg Steganography
2015
International Journal of Computer Applications
Steganography is the art and science of concealed communication with an aim to hide the secret messages in the cover medium. ...
The concept of minimal distortion embedding has been accepted in development of the steganographic system, where a well-designed distortion function plays an important role. ...
The problem of embedding fixed size message along with minimizing the distortion is a commonplace in steganography. ...
doi:10.5120/20030-1974
fatcat:tua5fopf4rhebdf2dyqcwwi7zq
Trellis-coded quantization for public-key steganography
[article]
2008
arXiv
pre-print
This paper deals with public-key steganography in the presence of a passive warden. ...
Whereas a practical attempt has been already done to provide a solution to this problem, it suffers of poor flexibility (since embedding and decoding steps highly depend on cover-signals statistics) and ...
CONCLUSION This paper provided a practical and efficient solution to the public-key steganography problem. ...
arXiv:0811.4700v1
fatcat:hyizhlwkqvdydg4gxxt6gpyamq
Modification ratio estimation for a category of adaptive steganography
2010
Science China Information Sciences
Modification ratio estimation for a category of adaptive steganography. ...
For the category of adaptive steganography satisfying these conditions, a general quantitative steganalysis method is presented based on specific areas and sample pair analysis. ...
This is also a key problem when applying existing quantitative steganalysis methods to the adaptive steganography methods. ...
doi:10.1007/s11432-010-4105-7
fatcat:swbteovnsngdfibqinr4heloum
JPEG steganography with particle swarm optimization accelerated by AVX
2019
Concurrency and Computation
or baked in pastry. 3 Besides technical steganography, its linguistic variants (eg, acrostic) hide the secret into a specific pattern of letters of a cover text. 2, 4 Digital steganography refers to information ...
The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography. ...
optimization problem arising in JPEG steganography. ...
doi:10.1002/cpe.5448
fatcat:e45t4gadafgvbcr7oko56pfpne
Adaptive Audio Steganography Based on Improved Syndrome-Trellis Codes
2021
IEEE Access
Syndrome-Trellis Code (STC) is a near-optimal convolutional method for adaptive steganography. ...
The generation of the adaptive parity-check matrix can be formulated as a multi-constrained integer programming problem in which the width of the submatrix is allocated at a fixed height. ...
A general methodology called syndrome coding use the parity-check matrix of error-correcting codes and use the decoding method of error-correcting codes as the coding method of steganography. ...
doi:10.1109/access.2021.3050004
fatcat:eughrwcxfjbxdhpvrxgghuu4v4
Data Hiding using Graphical Code based Steganography Technique
English
2015
International Journal of Engineering Trends and Technoloy
English
In this paper, a new steganography technique has been proposed using Graphical codes and also comparison with steganography technique using BCH codes has been studied. ...
Among them image steganography is a very attractive research area. The goal is to transmit a data within a modified image (called stego-image)by minimizing the number of bit flips. ...
They have proposed a matrix embedding technique based on RS codes which allows easy way to solve the bounded syndrome problem. ...
doi:10.14445/22315381/ijett-v27p225
fatcat:melobrm2p5anvcwugzteddesq4
Audio Steganography in Wavelet Domain A Survey
2012
International Journal of Computer Applications
The paper mainly concentrates on a survey on audio steganography in wavelet domain. ...
Under frequency domain the different techniques are tone insertion, phase coding and spread spectrum technique. This paper makes a discussion on audio steganography techniques. ...
AUDIO STEGANOGRAPHY TECHNIQUES
Temporal Domain 2.1.1 LSB: LSB [5],
Parity coding: Parity coding technique [3], [4] operates on a group of samples instead of individual samples. ...
doi:10.5120/8265-1810
fatcat:yw25yanptzfrzba6akujuawhey
Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion
2016
International Journal of Computer Applications
The study proposed a novel approach of data security using video steganography, Huffman Code compression and asymmetric cryptography. ...
From the results obtained in this research, it was observed that when video steganography is combined with Huffman code compression and asymmetric cryptography, a higher level of security, robustness and ...
By far, video steganography hiding technique is the best since it overcame the capacity problem of image steganography and alteration problem of text steganography. ...
doi:10.5120/ijca2016910156
fatcat:q2scsdjm3jgtzifiwxd7dczczu
A Recent Review of MP3 Based Steganography Methods
2014
International Journal of Security and Its Applications
Steganography, the idea of hiding messages and data within other pieces of data, can be useful in many real world applications alongside encryption and other code-writing methods. ...
In this article, in addition to more emphasis on MPEG-1 layer III (MP3) steganography methods with thorough information about weaknesses and strengths of these techniques, we present a complete study of ...
We also would like to thank our research group in supporting and giving positive comment to improve our paper. ...
doi:10.14257/ijsia.2014.8.6.35
fatcat:54h5t5kwwvhirdmzdd42alfeoe
Digital watermarking and steganography
[chapter]
2009
Understanding the Internet
The main purpose of this paper is to provide a proper background on the usage of audio file for the purpose of implementing new approaches and techniques in digital watermarking and steganography. ...
With the increasing usage of digital multimedia, the protection of intellectual property rights problem has become a very important issue. ...
ACKNOWLEDGEMENTS This research has been funded in part from University of Malaya under No. UM.C/625/1. ...
doi:10.1016/b978-1-84334-499-5.50025-8
fatcat:sxmxgxybivh4vhzefhe2cppwba
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography
2019
Journal of Information Hiding and Privacy Protection
K. (2018): Coverless steganography for digital images based on a generative model. ...
Q. (2016): Can machine learn steganography? implementing LSB substitution and matrix coding steganography with feed-forward neural networks. arXiv:1606.05294. Yang, J.; Liu, K.; Kang, X.; Wong, E. ...
Therefore, in the steganography process, the index relation can be converted to binary code hidden in the image. Besides, other secret information can also be hidden in images. ...
doi:10.32604/jihpp.2019.05797
fatcat:7x46jpuffnckzok5p4bnsmt2hi
Review of an Improved Audio Steganographic Technique over LSB through Random Based Approach
2013
IOSR Journal of Computer Engineering
This paper proposes a method of audio steganographic system that provides a unique platform to hide the secret information in audio file though the information is in text, image or in an audio format. ...
The need for secured communication introduces the concept of "Steganography". ...
The echo is a resonance added to the host signal and hence the problem with the additive noise is avoided here. ...
doi:10.9790/0661-0913034
fatcat:iszzgn52qngalpapat5hf3cxz4
« Previous
Showing results 1 — 15 out of 5,072 results