Steganographic method based on hidden messages embedding into Bezier curves of SVG images

نویسندگان

چکیده

The description of the steganographic method for embedding digital watermark into image vector files SVG format is given. Vector images in can include elements based on Bezier curves. proposed splitting cubic Embedding hidden information involves curves according to given as numerical sequence. Algorithms direct and reverse transformation are considered proving authenticity integrity a image. StegoSVG library has been developed implement forward transformations. desktop application that implements briefly described.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extracting hidden messages in steganographic images

The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful...

متن کامل

Multiple Messages Embedding Using DCT-Based Mod4 Steganographic Method

This paper proposes an extension of DCT-based Mod4 steganographic method to realize multiple messages embedding (MME). To implement MME, we utilize the structural feature of Mod4 that uses vGQC (valid group of 2 × 2 adjacent quantized DCT coefficients) as message carrier. vGQC’s can be partitioned into several disjoint sets by differentiating the parameters where each set could serve as an indi...

متن کامل

Bezier Curves Approximation of Triangularized Surfaces using SVG

This paper presents a technique to convert surfaces, obtained through a Data Dependent Triangulation, in Bezier Curves by using a Scalable Vector Graphics File format. The method starts from a Data Dependent Triangulation, traces a map of the boundaries present into the triangulation, using the characteristics of the triangles, then the estimated barycenters are connected, and a final conversio...

متن کامل

On Steganographic Embedding Efficiency

In this paper, we study embedding efficiency, which is an important attribute of steganographic schemes directly influencing their security. It is defined as the expected number of embedded random message bits per one embedding change. Constraining ourselves to embedding realized using linear covering codes (so called matrix embedding), we show that the quantity that determines embedding effici...

متن کامل

Novel steganographic method based on jig swap puzzle images

bstract. A new steganographic method for data hiding in jig swap uzzle images is proposed. First, a color image is taken as input and ivided into blocks. Second, each block is rearranged to a new poition according to the secret data and a stegokey. The resulting mage is a perfect jig swap puzzle. The original image is needed for xtracting the secret data. Under the assumption that the receiver ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ?????? ???????????? ???????????????? ????????????

سال: 2021

ISSN: ['2520-6508', '2617-3956']

DOI: https://doi.org/10.33581/2520-6508-2021-3-68-83