A High Secured Steganalysis Using QVDHC Model

نویسندگان

چکیده

Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the techniques are categorized into two types. They lossless, lossy compression. The format will be an audio, image, text or video. main objective save memory of using these preserve confidentiality, integrity. In this paper, hybrid approach was proposed which combines Quotient Value Difference (QVD) with Huffman coding. These methods more efficient, simple implement provides better data. secret message encoded coding, while cover image compressed QVD. Then embedded transferred over network receiver. At receiver end, decompressed obtain original message. method shows high level performance when compared other existing quality minimum error.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganalysis Using Color Model Conversion

The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence o...

متن کامل

Model-based steganalysis using invariant features

One of the biggest challenges in universal steganalysis is the identification of reliable features that can be used to detect stego images. In this paper, we present a steganalysis method using features calculated from a measure that is invariant for cover images and is altered for stego images. We derive this measure, which is the ratio of any two Fourier coefficients of the distribution of th...

متن کامل

Steganalysis using logistic regression

We advocate Logistic Regression (LR) as an alternative to the Support Vector Machine (SVM) classifiers commonly used in steganalysis. LR offers more information than traditional SVM methods – it estimates class probabilities as well as providing a simple classification – and can be adapted more easily and efficiently for multiclass problems. Like SVM, LR can be kernelised for nonlinear classifi...

متن کامل

Fusion of Steganalysis Systems Using Bayesian Model Averaging

The increasing use of steganography requires digital forensic examiners to consider the extraction of hidden information from digital images encountered during investigations. The first step in extraction is to identify the embedding method. Several steganalysis systems have been developed for this purpose, but each system only identifies a subset of the available embedding methods and with var...

متن کامل

Robust and High-Secured Watermarking System Using Zernike Moments

Watermarking is an effective technology that solves many problems within a digitization project. A high capacity data entrenching scheme based on precise and fast framework for the computation of Zernike moments (ZMs) is proposed in this paper. The high capacity is achieved by maximizing data entrenching size and improving the hiding ratio after dipping the inaccuracies in the computation of ZM...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Recent and Innovation Trends in Computing and Communication

سال: 2022

ISSN: ['2321-8169']

DOI: https://doi.org/10.17762/ijritcc.v10i9.5709