The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose robust watermarking schema for video files based on spread spectrum theory. The main concept relies on utilization of time as temporal dimension for spreading of watermark bits that are assigned to video frames. The second level spreading that is impartial to first level, uses different set of PN sequences within the video frames what allows to utilize multiple watermarking...
Since JPEG images have been widely used in our daily life, the steganalysis for JPEG images becomes very important and significant. The Article addresses steganalysis in static images based on DCT transformed region, able to recognize the most popular steganography algorithms occurring on the Internet. We propose a new steganalysis method, where statistical properties of the image are explored, regardless...
The Elliptic Curve Cryptosystem is an emerging alternative for traditional Public-Key Cryptosystem like RSA, DSA and DH. It provides the highest strength-per-bit of any cryptosystem known today with smaller key sizes resulting in faster computations, lower power consumption and memory. It also provides a methodology for obtaining high-speed, efficient and scalable implementation of protocols for authentication...
In this paper we propose two dimensional spread spectrum watermarking framework based on Direct Spread Spectrum theory using PN sequences. The presenting schema allows acquiring a high level of robustness with desired imperceptibility. The aim of this paper was to present robust and adaptive watermarking system for multimedia protection, where hidden watermark provides a desired requisition against...
Steganography is the science of hiding secret information in another unsuspicious data. Generally, a steganographic secret message could be a widely useful multimedia: as a picture, an audio file, a video file or a message in clear text - the covertext. The most recent steganography techniques tend to hide a secret message in digital images. We propose and analyze experimentally a blind steganography...
This paper is focused on comparison of two steganalytic methods that are able to detect embedding of secret message using popular and novel steganographic algorithms in JPEG images. First one is based on binary similarity measures and second method exploits 66 or 274 statistical features in transform domain from cover and stego images. The tested universal model was trained using novel steganographic...
The objective of this paper is performance testing of Feature-based Steganalysis methods for detection of steganography tools that are used for hiding a secret message in still images. Many of those tools, which can be used publicly, cause statistical changes in original images during embedding process. The features represent those statistically calculated changes, where feature extraction in this...
We propose and analyze experimentally a blind steganography method based on specific attributes of two dimensional discrete wavelet transform set by Haar mother wavelet. Steganography is the science that deals with hiding a secret message in unsuspicious cover media. The most recent steganographic techniques tend to hide a secret message in digital images. The blind steganography methods do not require...
This paper presents results of multi-classification and cross-validation of tested steganalysis method in static images in JPEG format. Steganalysis methods are used for revealing a secret communication conducted by different steganographic tools. The steganalysis algorithm analyzes changes in statistical parameters of the images using Feature Based Steganalysis. The multi-classification is ability...
In this paper, we present a novel JPEG steganography method with histogram preserving scheme. The embedding is performed in transformation domain of DCT in JPEG file by modification of selected DCT transform coefficients according to modulo function, which allows to extract the secret message without cover-image being present at the receiver side what gives a predisposition of blind steganography...
In this paper, we present a novel steganographic method for embedding of secret data in still grayscale image. In order to provide large capacity of the secret data while maintaining good visual quality of stego-image, the embedding process is performed in transform domain of Discrete Wavelet transform (DWT) by modifying of transform coefficients in an appropriate manner. In addition, the proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.