Efficient & Secure Data Hiding Using Secret Reference Matrix

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Data Hiding Algorithm Using Encrypted Secret message

In any communication, security is the most important issue in today‟s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. This project is a combination of steganography and cryptography, which provides a strong backbone for its security. The scenario of present day of information security system includes co...

متن کامل

A Secure Data Hiding Technique in Compressed Video Using a Secret Key

This paper deals with data hiding in compressed video. Unlike data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain which are vulnerable to steganalysis, we target the motion vectors used to encode and reconstruct both the forward predictive (P)-frame and bidirectional (B)-frames in compressed video. The choice of candidate subset of th...

متن کامل

Secure Data Hiding Using Eight Queens Solutions

The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing the bit selection in a cover image for hiding purpose. Cover image is divided into blocks of 8x1 bytes and then masked with solutions of the 8-queens problem. Bits from the block are collected corresponding to the 8-queen solution to make a 7 bit strin...

متن کامل

Secure Data-Hiding in Multimedia Using NMF

This paper presents a novel data-hiding scheme for multimedia data using non-negative matrix factorization (NMF). Nonnegative feature space (basis matrix) is estimated using the NMF-framework from the sample set of multimedia objects. Subsequently, using a secret key a subspace (basis vector) of the estimated basis matrix is used to decompose the host data for information embedding and detectio...

متن کامل

Hiding Secret Data in an Image Using Codeword Imitation

This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to sort the codebook and to find two similar codewords of an image block. According to the secret to be embedded and the difference between those two similar codewords, the original image block is transformed into a dif...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Network Security & Its Applications

سال: 2012

ISSN: 0975-2307

DOI: 10.5121/ijnsa.2012.4104