نتایج جستجو برای: pair wise least significant bit matching

تعداد نتایج: 1779437  

Journal: :Comput. J. 2014
Tao Han Weiming Zhang Chao Wang Nenghai Yu Yuefei Zhu

A novel adaptive steganographic scheme for spatial image is proposed. A noisy function is used to measure texture complexity of 2 × 2 pixel blocks, which keeps monotonic increasing after ±1 modifications. Therefore, the message is embedded into the noisiest areas and the recipient can identify the embedding region. The ‘double-layered embedding’ is exploited to reduce the number of ±1 modificat...

2002
Faisal Alturki Russell M. Mersereau

techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques steps to escape detection. We explore different techniques that can b...

Journal: :I. J. Network Security 2017
Yu-Lun Wang Jau-Ji Shen Min-Shiang Hwang

A dual image technique is used as one of the data hiding method. Dual image copies an image to two same images. Through two images to embed or extract secret data, this technique significantly enhances image quality. A dual image technique is good or bad depending on the merits of its algorithm. This paper proposes a method to improve Lu et al. scheme. They use two pixels as a pair and choose t...

Journal: :CoRR 2011
P. Thiyagarajan G. Aghila V. Prasanna Venkatesan

The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence o...

2016
Linda Meylani Nur Andini Iswahyudi Hidayat

Coded modulation scheme introduce robust and reliable system. It combine coding and modulation in one system. This paper show performance of coded modulation with coding rate 2/3, using 8PSK and convolutional coding that implemented in MC CDMA system. MC CDMA is one of multicarrier system that combine OFDM and CDMA so its offer reliable system in frequency selective fading. Decoding process for...

2013
Fangjun Huang Yane Zhong Jiwu Huang

In edge adaptive image steganography based on LSB matching revisited algorithm (EAMR for short in this paper), the secret message bits are embedded into those consecutive pixel pairs whose absolute difference of grey values are larger than or equal to a threshold T. Tan et al. [1] pointed out that since those adjacent pixel pairs can be located by the potential attackers, the pulse distortion i...

2009
Yoshinori Aono

In this paper we present a new lattice construction for a lattice based partial key exposure attack for the RSA cryptography. We consider the situation that the RSA secret key d is small and a sufficient amount of the LSBs (least significant bits) of d are known by the attacker. We show that our lattice construction is theoretically more efficient than known attacks proposed in [2, 7]. This is ...

2009
Hengfu YANG Xingming SUN Guang SUN

Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs) su...

2011
Qinglong Tian Ronghui Wu Zhihua Xia Zhili Zhou Yan Jiang

This paper proposed a new steganalysis method against least significant bit (LSB) matching for images with high noise component which is considered more difficult for steganalysis than images with low noise component. First we calculate the sum of curvature of images histogram as discriminative feature which will reduce after LSB matching. Then, the calibration mechanism is introduced to reduce...

2013
V. Lokeswara Reddy

Today’s internet applications require data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the solution for this problem is Steganography. That has to do with secure data transmission between a sender and a receiver; implementing Steganography is the best way. Steganography...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید