An authentication alternative using histogram shifting steganography method
نویسندگان
چکیده
منابع مشابه
J4: JPEG Steganography using Dual Histogram Compensation
Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...
متن کاملReversible Watermarking Technique using Histogram Shifting Modulations
This paper proposes creating new reversible marking technique. This originally based on indentifying parts of the image which are watermarked using two different Histogram Shifting (HS) modulations. One is Pixel Histogram shifting and other is Dynamic Prediction Error Histogram Shifting (DPEHS). This technique offers a very good compromise in terms of capacity and image quality preservation for...
متن کاملData Security and Authentication Using Steganography
Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing security-using Steganography. In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is encrypted and authenticated. This message...
متن کاملPublic-key Steganography with Authentication Public-key Steganography with Authentication
Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...
متن کاملSteganography with Least Histogram Abnormality
A novel steganographic scheme is proposed which avoids asymmetry inherent in conventional LSB embedding techniques so that abnormality in the image histogram is kept minimum. The proposed technique is capable of resisting the χ test and RS analysis, as well as a new steganalytic method named GPC analysis as introduced in this paper. In the described steganographic technique, a pair of mutually ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Teknologi dan Sistem Komputer
سال: 2021
ISSN: 2338-0403
DOI: 10.14710/jtsiskom.2021.13931