An authentication alternative using histogram shifting steganography method

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

J4: JPEG Steganography using Dual Histogram Compensation

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...

متن کامل

Reversible Watermarking Technique using Histogram Shifting Modulations

This paper proposes creating new reversible marking technique. This originally based on indentifying parts of the image which are watermarked using two different Histogram Shifting (HS) modulations. One is Pixel Histogram shifting and other is Dynamic Prediction Error Histogram Shifting (DPEHS). This technique offers a very good compromise in terms of capacity and image quality preservation for...

متن کامل

Data Security and Authentication Using Steganography

Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing security-using Steganography. In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is encrypted and authenticated. This message...

متن کامل

Public-key Steganography with Authentication Public-key Steganography with Authentication

Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...

متن کامل

Steganography with Least Histogram Abnormality

A novel steganographic scheme is proposed which avoids asymmetry inherent in conventional LSB embedding techniques so that abnormality in the image histogram is kept minimum. The proposed technique is capable of resisting the χ test and RS analysis, as well as a new steganalytic method named GPC analysis as introduced in this paper. In the described steganographic technique, a pair of mutually ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Teknologi dan Sistem Komputer

سال: 2021

ISSN: 2338-0403

DOI: 10.14710/jtsiskom.2021.13931