Double phase modular steganography with the help of error images
Recommend Documents
schemes such as HUGO (highly undetectable stego) and EA. (edge adaptive). ... detect information more accurately, so BOSS (break our steganographic ...
more accurately, so BOSS (break our steganographic system) version 1.01 was used to ... The BOSS database consists of 10,000 8-bit grayscale images of size.
found that DMR can, for some circuits, be enhanced to provide soft error correction as well as detection. The general approach, DDMR (Diverse DMR), relies on ...
Jul 28, 2009 - This paper pro- poses a novel method to hide secret data in jigsaw puzzle images. ... under the passive warden and robust to format conversion, lossy com- pression, and ..... puzzle image, we use Adobe Photoshop CS4 to store the image
into digital media (image, video, audio, text) with a minimum amount of ...... method using luminance componentâ, Elektronika ir Elektrotechnika, vol. 19, pp.
knowing that it contains a hidden message. ... video-audio synchronization, companies' safe circulation of secret data, .... totally the hidden data. Direct spatial ...
investigate the various steganograhy methods & how they are implemented . ... (or embedder [12]) embeds the secret message to be sent into a graphic file [11] ...
IEEE Transactions on Consumer Electronics, Vol. 49, No. 4, NOVEMBER 2003. Contributed Paper. Manuscript received September 29, 2003. 0098 3063/00 ...
numerically the bit-error rate of a WDM optical communication system over many fiber spans with ... mixing (FWM) of pulses during transmission in a multi-.
are not commonly used on the web and tend to stand ... splitting them in the best possible way [5]. .... free web-hosting companies (e.g., YouTube, Google.
cryptography. Cryptography concentrates more on the security or encryption of data whereas. Steganography aims to defeat
The number of days each student was enrolled (membership), numbers of days ... makes the PowerSchool software run quicke
faces represented in a range image with triangles of vari- able size. The size of .... thogonal to the axis of the range sensor and placed opposite ... convex hull, removing those exterior triangles that do not ... angles satisfy the approximation er
[1] B. Wu, and E. E. Narimanov, âA method for secure communications over a public fiber-optical network,â Opt. Express 14, 3738-3751 (2006). [2] Z. Wang, and ...
An aberration associated with application of LSB technique for every byte of .... with its digital signature (encrypted HASH) and affix it as message header at the ...
the 'Digital Image Steganography' is mostly defined in relation to the limitation of ..... with its digital signature (encrypted HASH) and affix it as message header at ...
Aug 11, 2015 - (http://doubledialogues.insteadjournal.com/wp-content/uploads/ .... (http://haulezvastgoed.files.wordpress.com/2011/03/saeftinghe.jpg) in the.
A Double Error Dynamic Asymptote Model of Associative Learning. Niklas H. Kokkola, Esther Mondragón and Eduardo Alonso. City, University of London.
number generator to spread the message over the sound file in a random manner. ... audio signal's frequency spectrum as much as possible. This is analogous ...
whether an image contains hidden data; the focus is on grayscale bitmap ... LSB steganography, b) to use large image libraries to give experimental evidence.
methods include micro points, digital signature, and steganography channels. ..... In the images, we tried to follow these guidelines so that the test results ...
Mar 25, 2009 - AbstractâThe error probability is derived analytically for dif- ferential phase-shift keying (DPSK) signals contaminated by both self- and ...
ELEMENTs, separated by commas and the set itself is delimited by and ]. In order to de ne equations over list functions, we need list variables: variables. Elts 123] ! ... the type-environment results in BOOL, and checking if two types are same re- .
Andrew D. Ker. Oxford University Computing Laboratory, Parks ...... The author is grateful to Sue Haines and Rob Thompson at DSTL for conversations and ...
Double phase modular steganography with the help of error images
Department of Computer Engineering, Chosun University, Gwangju, South Korea .... pixels to estimate the degree of smoothness using two-sided, three-sided, and four-sided ..... IEEE Trans Inf Forensic Secur 5(2):201â214 ... Inkyu Moon received the B.S. and M.S. degrees in electronics engineering from SungKyunKwan ...
Multimed Tools Appl DOI 10.1007/s11042-013-1844-7
Double phase modular steganography with the help of error images Masoud Afrakhteh & Inkyu Moon & Jeong-A Lee
# Springer Science+Business Media New York 2014
Abstract Many steganographic schemes based on popular least significant bit (LSB) embedding have been proposed. The embedding procedure is totally independent of pixel values due to the fact that only the LSB has to be altered. Other methods either randomly increment/ decrement the pixel value or use a function to do so. Because of this, the maximum embedding capacity cannot exceed 1 bit per pixel (bpp). State-of-the-art steganographic schemes, such as edge adaptive (EA) and highly undetectable stego (HUGO), aim at such LSB-based approaches with the help of LSB-matching algorithms and, unlike classical steganography, are more concerned about the undetectability level of the stego image rather than the peak signalto-noise ratio (PSNR) of the stego images. There is a trade-off between detectability and the embedding rate of the stego images. The larger the embedding rate, the higher the chance of detectability, and the opposite is also true. On the other hand, classical steganographic approaches aim for maximum embedding capacity (say 4 bpp) while their main ability is to provide greater PSNR values rather than undetectability. In this work, a novel modular steganographic scheme is proposed in a spatial domain that takes advantage of error images resulting from applying an image quality factor (the same as the ones used in JPEG compression) in order to find the pixels where the secret data could be embedded. We show that our proposed method is less detectable compared to the EA method. The proposed method is almost as undetectable as HUGO. The detectability level is evaluated by the most recent stateof-the-art steganalysis attack, called ensemble classifiers, with second-order subtractive pixel adjacency model features given as their input. In addition, the proposed method can embed up to 4 bpp, yet maintain a high PSNR value. Keywords JPEG image quality factors . Error image . Ensemble classifier . Information hiding . Steganography