Filters








5 Hits in 6.1 sec

Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme

A. Sarkar, L. Nataraj, B. S. Manjunath, U. Madhow
2008 2008 15th IEEE International Conference on Image Processing  
To maximize the embedding rate for a given image and a specified attack channel, the redundancy factor used by the repeataccumulate (RA) code based error correction framework in YASS is optimally chosen  ...  The effectiveness of YASS for robust steganography is demonstrated for certain attacks.  ...  Frequency Domain Analysis of Hiding and Detection for Different Attacks The channel distortions can be due to a variety of attacks, apart from just JPEG compression.  ... 
doi:10.1109/icip.2008.4711999 dblp:conf/icip/SarkarNMM08 fatcat:3iwn3o2mzre2pbo5w3n3hn3qz4

Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

Anindya Sarkar, Upamanyu Madhow, B S Manjunath
2010 IEEE Transactions on Information Forensics and Security  
To reduce detectability, we hide in randomized blocks, as in the recently proposed Yet Another Steganographic Scheme (YASS), replacing the QIM-based embedding in YASS by the proposed ME-RA scheme.  ...  In this paper, we employ the ME-RA scheme, a combination of ME-based hiding with powerful repeat accumulate (RA) codes for error correction, to address this problem.  ...  While the ME-based methods generally focus on passive steganography, our QIM-based hiding scheme YASS [28] achieved secure (using randomized block locations) and robust (using RA-codes) steganography  ... 
doi:10.1109/tifs.2010.2046218 fatcat:j3gxbenxznedlezykr6lqq4niu

Current status and key issues in image steganography: A survey

Mansi S. Subhedar, Vijay H. Mankar
2014 Computer Science Review  
This article provides a review of fundamental concepts, evaluation measures and security aspects of steganography system, various spatial and transform domain embedding schemes.  ...  In addition, image quality metrics that can be used for evaluation of stego images and cover selection measures that provide additional security to embedding scheme are also highlighted.  ...  Ramaiya et al. developed a spatial domain steganography scheme based on DES using S box mapping and secret key.  ... 
doi:10.1016/j.cosrev.2014.09.001 fatcat:vpvq6qozrrcvpfuhz73t26ma54

Ensemble Classifiers for Steganalysis of Digital Media

Jan Kodovsky, Jessica Fridrich, Vojtěch Holub
2012 IEEE Transactions on Information Forensics and Security  
In this paper, we propose an alternative and wellknown machine learning tool -ensemble classifiers implemented as random forrests -and argue that they are ideally suited for steganalysis.  ...  Ensemble classification is portrayed here as a powerful developer tool that allows fast construction of steganography detectors with markedly improved detection accuracy across a wide range of embedding  ...  The ensemble is especially useful for fast feature development when attacking a new scheme.  ... 
doi:10.1109/tifs.2011.2175919 fatcat:qnmznvbud5hytb75zqxvq2ved4

CHARACTERIZATION OF A CUFF-BASED SHAPE MEMORY ALLOY (SMA) ACTUATOR

Gang Wang, Michael Poscente, Simon Park, Orly Yadid-Pecht, Martin Mintchev
2015 Number 1 International Journal "Information Theories and Applications   unpublished
This article proposes a novel cuff-based microactuator for automatic blood extraction using Shape Memory Alloy (SMA) technology.  ...  Testing results demonstrated that this actuator can produce a maximum penetration force of 160gf and a maximum displacement depth of 2.45mm, which both exceed the minimum force and depth requirements for  ...  Acknowledgements This study was supported in part by the Natural Sciences and Engineering Research Council of Canada and the Innovates Centre of Research Excellence (iCORE), Alberta Innovates Technology  ... 
fatcat:6yhy352itzae7ec7q56evuzloy