NEW SECURE QIM-BASED INFORMATION HIDING ALGORITHMS
نویسندگان
چکیده
منابع مشابه
Secure Information Hiding based on Computationally Intractable Problems
1 In this work, a method for proving copyright ownership is presented that is based on Zero Knowledge Interactive Proof (ZKIP) protocols for computationally intractable problems. The utilized problem is the 3-coloring problem, which consists in assigning one of three available colors to the vertices of a graph so that no two adjacent vertices have the same color. Using the presumed computationa...
متن کاملNonparametric steganalysis of QIM data hiding using approximate entropy
This paper proposes a nonparametric steganalysis method for quantization index modulation (QIM) based steganography. The proposed steganalysis method uses irregularity (or randomness) in the test-image to distinguish between the coverand the stego-image. We have shown that plain-quantization (quantization without message embedding) induces regularity in the resulting quantized-image; whereas me...
متن کاملInformation Driven Evaluation of Data Hiding Algorithms
Privacy is one of the most important properties an information system must satisfy. A relatively new trend shows that classical access control techniques are not sufficient to guarantee privacy when datamining techniques are used. Privacy Preserving Data Mining (PPDM) algorithms have been recently introduced with the aim of modifying the database in such a way to prevent the discovery of sensib...
متن کاملGenre-Based Information Hiding
While data encryption is an effective means of keeping data private it does not conceal the presence of ‘hidden’ information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place across a public network such as the Intern...
متن کاملImage Error concealment Based on QIM Data Hiding in Dual-Tree Complex Wavelets
Transmission of block-coded images through error-prone radio mobile channel often results in lost blocks. Error concealment (EC) techniques exploit inherent redundancy and reduce visual artifacts through post-processing at the decoder side. In this paper, we propose an efficient quantization index modulation (QIM)-based data hiding scheme using dual-tree complex wavelet transform (DTCWT) for th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Optics
سال: 2018
ISSN: 2412-6179,0134-2452
DOI: 10.18287/2412-6179-2018-42-1-118-127