نتایج جستجو برای: pair wise least significant bit matching

تعداد نتایج: 1779437  

2014
K. Steffy

Video Steganography to embed Image is an art and science of hiding images by embedding images within the video file, seemingly harmless images. An encrypted image or files may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen. The LSB approach is used along with the MaskingFiltering and Transformations techniques to hide the ...

2008
Yoshinori Aono

In this paper we present a new lattice construction for a lattice based partial key exposureattack for the RSA cryptography. We consider the situation that the RSA secret key d is smalland a sufficient amount of the LSBs (least significant bits) of d are known by the attacker. Weshow that our lattice construction is theoretically more efficient than known attacks proposedin ...

Journal: :I. J. Network Security 2015
Amitava Nag Sushanta Biswas Debasree Sarkar Partha Pratim Sarkar

Steganography is the branch of information hiding for secret communication. The simplest and widely used steganography is the LSB based approach due to its visual quality with high embedding capacity. However, LSB based steganography techniques are not secure against statistical steganalysis mainly χ2 attack and Regular Singular (RS) attack. These two staganalysis can easily estimate the hidden...

Journal: :IEEE Trans. Information Theory 1999
Jovan Dj. Golic

A keystream generator, known as RC4, consisting of a permutation table that slowly varies in time under the control of itself, is analyzed by the linear model approach. The objective is to find linear relations among the keystream bits that hold with probability different from one half by using the linear sequential circuit approximation method. To estimate the corresponding correlation coeffic...

2006
Steve Reeves David Streader

We define two lifted, total relation semantics for Event B machines: Safe B for safety-only properties and Live B for liveness properties. The usual Event B proof obligations, Safe, are sufficient to establish Safe B refinement. Satisfying Safe plus a simple additional proof obligation ACT REF is sufficient to establish Live B refinement. The use of lifted, total relations both prevents the amb...

2007
Kh. Manglem Singh S. Birendra Singh Shyam Sundar Singh

This paper proposes a novel least significant bit embedding algorithm for hiding encrypted messages in nonadjacent and random pixel locations in edges of images. It first encrypts the secret message, and detects edges in the coverimage. Message bits are then, embedded in the least significant bits and random locations of the edge pixels. It ensures that the eavedroppers will not have any suspic...

Journal: :IACR Cryptology ePrint Archive 2014
Abderrahmane Nitaj Muhammad Rezal Kamel Ariffin

Let N1 = p1q1 and N2 = p2q2 be two RSA moduli, not necessarily of the same bit-size. In 2009, May and Ritzenhofen proposed a method to factor N1 and N2 given the implicit information that p1 and p2 share an amount of least significant bits. In this paper, we propose a generalization of their attack as follows: suppose that some unknown multiples a1p1 and a2p2 of the prime factors p1 and p2 shar...

Journal: :CoRR 2017
Kazem Qazanfari Reza Safabakhsh

LSB method is one of the well-known steganography methods which hides the message bits into the least significant bit of pixel values. This method changes the statistical information of images, which causes to have an unsecured channel. To increase the security of this method against the steganalysis methods, in this paper an adaptive method for hiding data into images will be proposed. So, the...

Journal: :IJCNS 2009
Debnath Bhattacharyya Jhuma Dutta Poulami Das Samir Kumar Bandyopadhyay Tai-Hoon Kim

In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner an...

Journal: :J. UCS 2005
Nedeljko Cvejic Tapio Seppänen

In this paper, we present a novel high bit rate LSB audio watermarking method that reduces embedding distortion of the host audio. Using the proposed two-step algorithm, watermark bits are embedded into higher LSB layers, resulting in increased robustness against noise addition. In addition, listening tests showed that perceptual quality of watermarked audio is higher in the case of the propose...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید