A High Secured Steganalysis Using QVDHC Model
نویسندگان
چکیده
Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the techniques are categorized into two types. They lossless, lossy compression. The format will be an audio, image, text or video. main objective save memory of using these preserve confidentiality, integrity. In this paper, hybrid approach was proposed which combines Quotient Value Difference (QVD) with Huffman coding. These methods more efficient, simple implement provides better data. secret message encoded coding, while cover image compressed QVD. Then embedded transferred over network receiver. At receiver end, decompressed obtain original message. method shows high level performance when compared other existing quality minimum error.
منابع مشابه
Steganalysis Using Color Model Conversion
The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence o...
متن کاملModel-based steganalysis using invariant features
One of the biggest challenges in universal steganalysis is the identification of reliable features that can be used to detect stego images. In this paper, we present a steganalysis method using features calculated from a measure that is invariant for cover images and is altered for stego images. We derive this measure, which is the ratio of any two Fourier coefficients of the distribution of th...
متن کاملSteganalysis using logistic regression
We advocate Logistic Regression (LR) as an alternative to the Support Vector Machine (SVM) classifiers commonly used in steganalysis. LR offers more information than traditional SVM methods – it estimates class probabilities as well as providing a simple classification – and can be adapted more easily and efficiently for multiclass problems. Like SVM, LR can be kernelised for nonlinear classifi...
متن کاملFusion of Steganalysis Systems Using Bayesian Model Averaging
The increasing use of steganography requires digital forensic examiners to consider the extraction of hidden information from digital images encountered during investigations. The first step in extraction is to identify the embedding method. Several steganalysis systems have been developed for this purpose, but each system only identifies a subset of the available embedding methods and with var...
متن کاملRobust and High-Secured Watermarking System Using Zernike Moments
Watermarking is an effective technology that solves many problems within a digitization project. A high capacity data entrenching scheme based on precise and fast framework for the computation of Zernike moments (ZMs) is proposed in this paper. The high capacity is achieved by maximizing data entrenching size and improving the hiding ratio after dipping the inaccuracies in the computation of ZM...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Recent and Innovation Trends in Computing and Communication
سال: 2022
ISSN: ['2321-8169']
DOI: https://doi.org/10.17762/ijritcc.v10i9.5709