Steganography Algorithm within 2-LSBs with Indicators-Based Randomness
نویسندگان
چکیده
منابع مشابه
Randomness Efficient Steganography
Steganographic protocols enables one to “embed” covert messages into inconspicuous data over a public communication channel in such a way that no one, aside from the sender and the intended receiver can even detect the presence of the secret message. In this paper, we provide a new provably-secure, private-key steganographic encryption protocol. We prove the security of our protocol in the comp...
متن کاملA Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain
This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...
متن کاملWavelet Based Pseudo Quantum Steganography within Pseudo Color Barcode
-As information technology continues to accelerate, the need for transmitting secret information is in high demand whether information is from a corporation, the government, social media, or an individual. To meet high security and robustness requirements from various users, many steganography and cryptograph algorithms have been developed. As a result of the current advancements and developmen...
متن کاملRandomness-Efficient Sampling within NC
We construct a randomness-efficient averaging sampler that is computable by uniform constantdepth circuits with parity gates (i.e., in uniform AC0[⊕]). Our sampler matches the parameters achieved by random walks on constant-degree expander graphs, allowing us to apply a variety expander-based techniques within NC. For example, we obtain the following results: • Randomness-efficient error-reduct...
متن کاملModel Based Steganography with Precover
It is widely recognized that steganography with sideinformation in the form of a precover at the sender enjoys significantly higher empirical security than other embedding schemes. Despite the success of side-informed steganography, current designs are purely heuristic and little has been done to develop the embedding rule from first principles. Building upon the recently proposed MiPOD stegano...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing and Digital Systemss
سال: 2017
ISSN: 2210-142X
DOI: 10.12785/ijcds/060505