نتایج جستجو برای: lsb embedding
تعداد نتایج: 74641 فیلتر نتایج به سال:
(Markus Kahn, 1995) defines Steganography as art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other innocent messages in...
Nowadays, there have substantive research on road extraction automatically form RS images, restricted by low understanding level of images, the automatically extracting method is not robust, and a great many errors existed. The LSB-Snake model is an effective method to extract linear object semi-automatically, but needs manual input of road character for extraction, and not robust while the ini...
Watermarking belongs to hide particular information, so that you can easily detect any tamper detection .It is used for confidenality, authentication and copy right protection. In this paper watermarking is done with the help of least significant bit technique (LSB).As LSB technique is used as it has less effect on image. This new algorithm is using LSB of original image and idoing ‘&&’ operati...
Embedding Limitations with Digital-audio Watermarking Method Based on Cochlear Delay Characteristics
We comparatively evaluated the proposed approach for inaudible audio watermarking with four typical methods (LSB, DSS, ECHO, and PPM) by carrying out objective (PEAQ and LSD) and subjective (inaudibility) evaluations, bit-detection test, and robustness tests (signal modifications and StirMark benchmark). The results of evaluations revealed that subjects could not detect the embedded data in any...
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique ...
Steganography literally means "covered writing", which is derived from the Greek στεγοσ (roof) and γραπηια (writing). Cryptography, watermarking and stenography are closely related [Johnson and Jajodia 1998]. This paper introduces the basis of a wavelet-based low-throughput secret key steganography system that requires the exchange of a secret key (stego-key) prior to communication. We try to t...
In this paper, an unsupervised steganalysis method that combines artificial training sets and supervised classification is proposed. We provide a formal framework for unsupervised classification of stego and cover images in the typical situation of targeted steganalysis (i.e., for a known algorithm and approximate embedding bit rate). We also present a complete set of experiments using 1) eight...
An adaptive Steganography scheme is proposed in this paper. The adaptive quantization embedded is introduced and employed by block-wised fashion. We also constructed contrast-correlation distortion metric to optimally choose quantization steps for image blocks to guarantee more data being embedded in busy areas. Deferent form existing methods, our scheme embeds the AQE parameters together with ...
For hiding secret information in images, there exists a large variety of Steganography techniques. The least significant bit (LSB) insertion method is the most common and easiest method for embedding messages in an image in spatial domain but it has some limitations such as it is easier to understand using steganalysis, this limitation has been overcame in this work. This work intends to embed ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید