نتایج جستجو برای: lsb embedding

تعداد نتایج: 74641  

2013
EIL F. Johnson Sushil Jajodia Karen Bailey

(Markus Kahn, 1995) defines Steganography as art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other innocent messages in...

2008
Haitao ZHANG Zhou XIAO Qing ZHOU

Nowadays, there have substantive research on road extraction automatically form RS images, restricted by low understanding level of images, the automatically extracting method is not robust, and a great many errors existed. The LSB-Snake model is an effective method to extract linear object semi-automatically, but needs manual input of road character for extraction, and not robust while the ini...

Journal: :International Journal of Computer Applications 2014

2014
Anum Javeed Zargar

Watermarking belongs to hide particular information, so that you can easily detect any tamper detection .It is used for confidenality, authentication and copy right protection. In this paper watermarking is done with the help of least significant bit technique (LSB).As LSB technique is used as it has less effect on image. This new algorithm is using LSB of original image and idoing ‘&&’ operati...

2011
Masashi Unoki Kuniaki Imabeppu Daiki Hamada Atsushi Haniu Ryota Miyauchi R. Miyauchi

We comparatively evaluated the proposed approach for inaudible audio watermarking with four typical methods (LSB, DSS, ECHO, and PPM) by carrying out objective (PEAQ and LSD) and subjective (inaudibility) evaluations, bit-detection test, and robustness tests (signal modifications and StirMark benchmark). The results of evaluations revealed that subjects could not detect the embedded data in any...

2014
Sang-Ho Shin Gil-Je Lee Kee-Young Yoo

Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique ...

Journal: :CoRR 2008
P. Carrion Hélio Magalhães de Oliveira Ricardo M. Campello de Souza

Steganography literally means "covered writing", which is derived from the Greek στεγοσ (roof) and γραπηια (writing). Cryptography, watermarking and stenography are closely related [Johnson and Jajodia 1998]. This paper introduces the basis of a wavelet-based low-throughput secret key steganography system that requires the exchange of a secret key (stego-key) prior to communication. We try to t...

Journal: :Eng. Appl. of AI 2016
Daniel Lerch-Hostalot David Megías

In this paper, an unsupervised steganalysis method that combines artificial training sets and supervised classification is proposed. We provide a formal framework for unsupervised classification of stego and cover images in the typical situation of targeted steganalysis (i.e., for a known algorithm and approximate embedding bit rate). We also present a complete set of experiments using 1) eight...

2012
N. Santoshi B. Lokeswara Rao

An adaptive Steganography scheme is proposed in this paper. The adaptive quantization embedded is introduced and employed by block-wised fashion. We also constructed contrast-correlation distortion metric to optimally choose quantization steps for image blocks to guarantee more data being embedded in busy areas. Deferent form existing methods, our scheme embeds the AQE parameters together with ...

2012
Tanmay Bhattacharya Bikash Debnath S. R. Bhadra Chaudhuri

For hiding secret information in images, there exists a large variety of Steganography techniques. The least significant bit (LSB) insertion method is the most common and easiest method for embedding messages in an image in spatial domain but it has some limitations such as it is easier to understand using steganalysis, this limitation has been overcame in this work. This work intends to embed ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید