MULTIMEDIA DATA STEGANOGRAPHIC PROTECTION METHOD BASED ON PSEUDORANDOM EMBEDDING PROCEDURE
نویسندگان
چکیده
منابع مشابه
On Steganographic Embedding Efficiency
In this paper, we study embedding efficiency, which is an important attribute of steganographic schemes directly influencing their security. It is defined as the expected number of embedded random message bits per one embedding change. Constraining ourselves to embedding realized using linear covering codes (so called matrix embedding), we show that the quantity that determines embedding effici...
متن کاملMultiple Messages Embedding Using DCT-Based Mod4 Steganographic Method
This paper proposes an extension of DCT-based Mod4 steganographic method to realize multiple messages embedding (MME). To implement MME, we utilize the structural feature of Mod4 that uses vGQC (valid group of 2 × 2 adjacent quantized DCT coefficients) as message carrier. vGQC’s can be partitioned into several disjoint sets by differentiating the parameters where each set could serve as an indi...
متن کاملA steganographic method based on tetris games
Although various steganographic methods have been proposed that use distinct cover media, using games to hide data remains a recent development. The study presents a steganographic method based on online Tetris games, in which secret messages are embedded using a generated tetrimino sequence. Each time a person plays an online Tetris game, a new tetrimino sequence should be generated. The propo...
متن کاملCopy Protection for Multimedia Data based on Labeling Techniques
Service providers are reluctant to distribute their multimedia data in digital form because of their fears for unrestricted duplication and dissemination. Therefore robust methods must be developed to protect the proprietary rights of the multimedia data owners and to realize a copy protection
متن کاملOn the steganographic image based approach to PDF files protection
Digital images can be copied without authorization and have to be protected. Two schemes for watermarking images in PDF document were considered. Both schemes include a converter to extract images from PDF pages and return the protected images back. Frequency and spatial domain embedding were used for hiding a message presented by a binary pattern. We considered visible and invisible watermarki...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: KPI Science News
سال: 2020
ISSN: 2617-5509
DOI: 10.20535/kpi-sn.2020.1.197952