Filters








5,072 Hits in 4.6 sec

Discrete Transformations and Noise-Resistant Coding of Still Images in Steganography Problems

Vladimir N. Kustov, Anatoly A. Kornienko, Dmitry K. Protsko, Boris V. Sokolov
2018
This article is another attempt of a comprehensive solution in the field of steganography data transmission.  ...  channels with a high level of noise is also shown.  ...  Recently, in the field of digital signal transmission in channels with a high level of noise, methods of noisecorrecting coding based on the use of multi-threshold decoders (MTD) of self-orthogonal codes  ... 
doi:10.24412/1613-0073-2341-12-19 fatcat:3jryb3xvrnawhg7725ylol3tne

Optimum perfect steganography of memoryless sources as a rate-distortion problem

Felix Balado, David Haughton
2013 2013 IEEE International Workshop on Information Forensics and Security (WIFS)  
Thus steganography of memoryless sources using permutation coding is a rate-distortion problem.  ...  Although real host signals are not memoryless, a decorrelating energy-preserving transform can always be applied before a method that assumes a memoryless source, as is usually done in the dual problem  ...  Hence steganography of memoryless sources using permutation coding is a rate-distortion problem-insofar as devoid of detectability concerns.  ... 
doi:10.1109/wifs.2013.6707814 dblp:conf/wifs/BaladoH13 fatcat:xviclyioivdkzgfdmvszmdelvy

The Security of Arithmetic Compression Based Text Steganography Method

Reihane Saniei, Karim Faez
2013 International Journal of Electrical and Computer Engineering (IJECE)  
arithmetic coding and other methods of text steganography.  ...  Security of a modern design of steganography on lossless compression is studied in this paper.  ...  One of the problems of arithmetic coding is to generate data out of range. Scaling method has been proposed to overcome this problem, which keeps our data in a logical range [7] .  ... 
doi:10.11591/ijece.v3i6.4068 fatcat:nmtz326wzffqrizps4fqkm7dqm

A Review on Uniform Embedding For Efficient Jpeg Steganography

Aasemuddin Quazi, A.K. Gulve
2015 International Journal of Computer Applications  
Steganography is the art and science of concealed communication with an aim to hide the secret messages in the cover medium.  ...  The concept of minimal distortion embedding has been accepted in development of the steganographic system, where a well-designed distortion function plays an important role.  ...  The problem of embedding fixed size message along with minimizing the distortion is a commonplace in steganography.  ... 
doi:10.5120/20030-1974 fatcat:tua5fopf4rhebdf2dyqcwwi7zq

Trellis-coded quantization for public-key steganography [article]

Gaëtan Le Guelvouit
2008 arXiv   pre-print
This paper deals with public-key steganography in the presence of a passive warden.  ...  Whereas a practical attempt has been already done to provide a solution to this problem, it suffers of poor flexibility (since embedding and decoding steps highly depend on cover-signals statistics) and  ...  CONCLUSION This paper provided a practical and efficient solution to the public-key steganography problem.  ... 
arXiv:0811.4700v1 fatcat:hyizhlwkqvdydg4gxxt6gpyamq

Modification ratio estimation for a category of adaptive steganography

XiangYang Luo, FenLin Liu, ChunFang Yang, ShiGuo Lian
2010 Science China Information Sciences  
Modification ratio estimation for a category of adaptive steganography.  ...  For the category of adaptive steganography satisfying these conditions, a general quantitative steganalysis method is presented based on specific areas and sample pair analysis.  ...  This is also a key problem when applying existing quantitative steganalysis methods to the adaptive steganography methods.  ... 
doi:10.1007/s11432-010-4105-7 fatcat:swbteovnsngdfibqinr4heloum

JPEG steganography with particle swarm optimization accelerated by AVX

Vaclav Snasel, Pavel Kromer, Jakub Safarik, Jan Platos
2019 Concurrency and Computation  
or baked in pastry. 3 Besides technical steganography, its linguistic variants (eg, acrostic) hide the secret into a specific pattern of letters of a cover text. 2, 4 Digital steganography refers to information  ...  The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.  ...  optimization problem arising in JPEG steganography.  ... 
doi:10.1002/cpe.5448 fatcat:e45t4gadafgvbcr7oko56pfpne

Adaptive Audio Steganography Based on Improved Syndrome-Trellis Codes

Kaiyu Ying, Rangding Wang, Li Dong, Diqun Yan
2021 IEEE Access  
Syndrome-Trellis Code (STC) is a near-optimal convolutional method for adaptive steganography.  ...  The generation of the adaptive parity-check matrix can be formulated as a multi-constrained integer programming problem in which the width of the submatrix is allocated at a fixed height.  ...  A general methodology called syndrome coding use the parity-check matrix of error-correcting codes and use the decoding method of error-correcting codes as the coding method of steganography.  ... 
doi:10.1109/access.2021.3050004 fatcat:eughrwcxfjbxdhpvrxgghuu4v4

Data Hiding using Graphical Code based Steganography Technique
English

Debajit Sensarma, Samar Sen Sarma
2015 International Journal of Engineering Trends and Technoloy  
In this paper, a new steganography technique has been proposed using Graphical codes and also comparison with steganography technique using BCH codes has been studied.  ...  Among them image steganography is a very attractive research area. The goal is to transmit a data within a modified image (called stego-image)by minimizing the number of bit flips.  ...  They have proposed a matrix embedding technique based on RS codes which allows easy way to solve the bounded syndrome problem.  ... 
doi:10.14445/22315381/ijett-v27p225 fatcat:melobrm2p5anvcwugzteddesq4

Audio Steganography in Wavelet Domain A Survey

Jisna Antony, Sobin C. C, Sherly A. P
2012 International Journal of Computer Applications  
The paper mainly concentrates on a survey on audio steganography in wavelet domain.  ...  Under frequency domain the different techniques are tone insertion, phase coding and spread spectrum technique. This paper makes a discussion on audio steganography techniques.  ...  AUDIO STEGANOGRAPHY TECHNIQUES Temporal Domain 2.1.1 LSB: LSB [5], Parity coding: Parity coding technique [3], [4] operates on a group of samples instead of individual samples.  ... 
doi:10.5120/8265-1810 fatcat:yw25yanptzfrzba6akujuawhey

Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion

Richard Apau, J. B., Frimpong Twum
2016 International Journal of Computer Applications  
The study proposed a novel approach of data security using video steganography, Huffman Code compression and asymmetric cryptography.  ...  From the results obtained in this research, it was observed that when video steganography is combined with Huffman code compression and asymmetric cryptography, a higher level of security, robustness and  ...  By far, video steganography hiding technique is the best since it overcame the capacity problem of image steganography and alteration problem of text steganography.  ... 
doi:10.5120/ijca2016910156 fatcat:q2scsdjm3jgtzifiwxd7dczczu

A Recent Review of MP3 Based Steganography Methods

Mohsen Bazyar, Rubita Sudirman
2014 International Journal of Security and Its Applications  
Steganography, the idea of hiding messages and data within other pieces of data, can be useful in many real world applications alongside encryption and other code-writing methods.  ...  In this article, in addition to more emphasis on MPEG-1 layer III (MP3) steganography methods with thorough information about weaknesses and strengths of these techniques, we present a complete study of  ...  We also would like to thank our research group in supporting and giving positive comment to improve our paper.  ... 
doi:10.14257/ijsia.2014.8.6.35 fatcat:54h5t5kwwvhirdmzdd42alfeoe

Digital watermarking and steganography [chapter]

Kevin Curran, Xuelong Xi, Roisin Clarke
2009 Understanding the Internet  
The main purpose of this paper is to provide a proper background on the usage of audio file for the purpose of implementing new approaches and techniques in digital watermarking and steganography.  ...  With the increasing usage of digital multimedia, the protection of intellectual property rights problem has become a very important issue.  ...  ACKNOWLEDGEMENTS This research has been funded in part from University of Malaya under No. UM.C/625/1.  ... 
doi:10.1016/b978-1-84334-499-5.50025-8 fatcat:sxmxgxybivh4vhzefhe2cppwba

A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography

Ruohan Meng, Zhili Zhou, Qi Cui, Xingming Sun, Chengsheng Yuan
2019 Journal of Information Hiding and Privacy Protection  
K. (2018): Coverless steganography for digital images based on a generative model.  ...  Q. (2016): Can machine learn steganography? implementing LSB substitution and matrix coding steganography with feed-forward neural networks. arXiv:1606.05294. Yang, J.; Liu, K.; Kang, X.; Wong, E.  ...  Therefore, in the steganography process, the index relation can be converted to binary code hidden in the image. Besides, other secret information can also be hidden in images.  ... 
doi:10.32604/jihpp.2019.05797 fatcat:7x46jpuffnckzok5p4bnsmt2hi

Review of an Improved Audio Steganographic Technique over LSB through Random Based Approach

Bhagyashri A. Patil
2013 IOSR Journal of Computer Engineering  
This paper proposes a method of audio steganographic system that provides a unique platform to hide the secret information in audio file though the information is in text, image or in an audio format.  ...  The need for secured communication introduces the concept of "Steganography".  ...  The echo is a resonance added to the host signal and hence the problem with the additive noise is avoided here.  ... 
doi:10.9790/0661-0913034 fatcat:iszzgn52qngalpapat5hf3cxz4
« Previous Showing results 1 — 15 out of 5,072 results