Steganography in animated emoji using self-reference
نویسندگان
چکیده
Abstract Animated emoji is a kind of GIF image, which widely used in online social networks (OSN) for its efficiency transmitting vivid and personalized information. Aiming at realizing covert communication animated emoji, this paper proposes an improved steganography framework emoji. We propose self-reference algorithm to improve the security. Meanwhile, relations between adjacent frames cover image are considered further distortion function. After that we embed secret message into using popular Syndrome Trellis Coding (STC). Experimental results show proposed method can provide better security performances than state-of-the-art works.
منابع مشابه
using game theory techniques in self-organizing maps training
شبکه خود سازمانده پرکاربردترین شبکه عصبی برای انجام خوشه بندی و کوانتیزه نمودن برداری است. از زمان معرفی این شبکه تاکنون، از این روش در مسائل مختلف در حوزه های گوناگون استفاده و توسعه ها و بهبودهای متعددی برای آن ارائه شده است. شبکه خودسازمانده از تعدادی سلول برای تخمین تابع توزیع الگوهای ورودی در فضای چندبعدی استفاده می کند. احتمال وجود سلول مرده مشکلی اساسی در الگوریتم شبکه خودسازمانده به حسا...
Self-Representation on Twitter Using Emoji Skin Color Modifiers
Since 2015, it has been possible to modify certain emoji with a skin tone. The five different skin tones were introduced with the aim of representing more human diversity, but some commentators feared they might be used as a way to negatively represent other users/groups. This paper presents a quantitative analysis of the use of skin tone modifiers on emoji on Twitter, showing that users with d...
متن کاملAn Alternative Approach of Steganography using Reference Image
This paper is to create a practical steganographic implementation for 4-bit images. The proposed technique converts 4 bit image into 4 shaded Gray Scale image. This image will be act as reference image to hide the text. Using this grey scale reference image any text can be hidden. Single character of a text can be represented by 8-bit. The 8-bit character can be split into 4X2 bit information. ...
متن کاملSelf-reference in Arithmetic∗
AGödel sentence is oen described as a sentence saying about itself that it is not provable and a Henkin sentence as a sentence stating its own provability. We discuss what it couldmean for a sentence to ascribe to itself a property such as provability or unprovability. e starting point will be the answer Kreisel gave to Henkin’s problem. We describe how the properties of the supposedly self-re...
متن کاملBiometrics Security using Steganography
A biometric system is at risk to a variety of attacks. These attacks are intended to either avoid the security afforded by the system or to put off the normal functioning of the system. Various risks have been discovered while using biometric system. Proper use of cryptography greatly reduces the risks in biometric systems as the hackers have to find both secret key and template. It is notified...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Multimedia Systems
سال: 2021
ISSN: ['1432-1882', '0942-4962']
DOI: https://doi.org/10.1007/s00530-020-00723-z