نتایج جستجو برای: pair wise least significant bit matching
تعداد نتایج: 1779437 فیلتر نتایج به سال:
A novel adaptive steganographic scheme for spatial image is proposed. A noisy function is used to measure texture complexity of 2 × 2 pixel blocks, which keeps monotonic increasing after ±1 modifications. Therefore, the message is embedded into the noisiest areas and the recipient can identify the embedding region. The ‘double-layered embedding’ is exploited to reduce the number of ±1 modificat...
techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques steps to escape detection. We explore different techniques that can b...
A dual image technique is used as one of the data hiding method. Dual image copies an image to two same images. Through two images to embed or extract secret data, this technique significantly enhances image quality. A dual image technique is good or bad depending on the merits of its algorithm. This paper proposes a method to improve Lu et al. scheme. They use two pixels as a pair and choose t...
The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence o...
Coded modulation scheme introduce robust and reliable system. It combine coding and modulation in one system. This paper show performance of coded modulation with coding rate 2/3, using 8PSK and convolutional coding that implemented in MC CDMA system. MC CDMA is one of multicarrier system that combine OFDM and CDMA so its offer reliable system in frequency selective fading. Decoding process for...
In edge adaptive image steganography based on LSB matching revisited algorithm (EAMR for short in this paper), the secret message bits are embedded into those consecutive pixel pairs whose absolute difference of grey values are larger than or equal to a threshold T. Tan et al. [1] pointed out that since those adjacent pixel pairs can be located by the potential attackers, the pulse distortion i...
In this paper we present a new lattice construction for a lattice based partial key exposure attack for the RSA cryptography. We consider the situation that the RSA secret key d is small and a sufficient amount of the LSBs (least significant bits) of d are known by the attacker. We show that our lattice construction is theoretically more efficient than known attacks proposed in [2, 7]. This is ...
Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs) su...
This paper proposed a new steganalysis method against least significant bit (LSB) matching for images with high noise component which is considered more difficult for steganalysis than images with low noise component. First we calculate the sum of curvature of images histogram as discriminative feature which will reduce after LSB matching. Then, the calibration mechanism is introduced to reduce...
Today’s internet applications require data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the solution for this problem is Steganography. That has to do with secure data transmission between a sender and a receiver; implementing Steganography is the best way. Steganography...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید