An Efficiency and Algorithm Detection for Stenography in Digital Symbols

Автор: Takialddin A. Al Smadi, Mohammed Maitah

Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis

Статья в выпуске: 1 vol.6, 2013 года.

Бесплатный доступ

In modern conditions; Steganography has become the digital strategy of hiding files in one form or other MEDIA like images, sound files or video files. Algorithms built-in digital information for color images based techniques steganography. This work presents a new method of steganography based on space domain to encode more information in the image, making small changes in their pixels. The results work obtained in this work that the new detection method of steganography based on new spatial coding additional information in the image, making small changes in their pixels based on the expansion of the range is designed for testing the proposed structure. This work study is to develop a new method to detect human faces, reflected in digital photography, with a high work rate and accuracy of detection.

Еще

Embedded System, Steganography, Digital image, Information symbol

Короткий адрес: https://sciup.org/15011264

IDR: 15011264

Список литературы An Efficiency and Algorithm Detection for Stenography in Digital Symbols

  • Janakiraman T. N., and Chandra Mouli P. V. S. S. R., " Color Image Edge Detection using Pseudo-Complement and Matrix Operations", Proceedings of World Academy of Science, Engineering and Technology Volume 32, ISSN 2070-3740, 2008.
  • Ingemar, J. Cox. Digita l waterma king and d ste gano graphy J. Ingemar Cox, L. Mi ller Matt er Matt hew, A. Bloom Jeffrey effrey [et al.].–Mor gan Kaufmann Pu blis hers , 2008.
  • Van de Weijer J.; Gevers Th. and Geusebroek J.M., " Color Edge Detection by Photometric Quasi-
  • Invariants", Proceedings of the Ninth IEEE International Conference on Computer Vision (ICCV 2003) 2-Volume Set, 2003.
  • F. Bartolini, M. Barni, and A. Piva, ―Performance analysis of ST-DM,watermarking in presence of nonadditive attacks‖, IEEE Transactions onSignal Processing, Vol. 52, No. 10, October 2004, pp. 2965–2974.
  • B. Chen and G. Wornell, ―Quantization index modulation: a class of provably good methods for digital watermarking and information embedding‖, IEEE Transactions on Information Theory, Vol. 47, No. 4,May 2001, pp. 1423–1443.
  • M. Barni, F. Bartolini, A. De Rosa, and A. Piva, ―Capacity of full frame DCT image watermarks‖, IEEE Transactions on Image Processing, Vol.9, No. 8, August 2000, pp. 1450–1455.
  • K. Su, D. Kundur, and D. Hatzinakos, ―Statistical invisibility for collusion-resistant digital video watermarking‖, IEEE Transactions onMultimedia, Vol. 7, No. 1, Feburary 2005, pp. 43–51.
  • Mei-Yi, W., Yu-Kun, H. , Jia-Hong, L. (2004): An Iterative Method of Palette Based mage Steganography, Journal of Patern ecognition Letters,Vol(25).
  • Xiang-yang, L. , Dao-shun,W., Ping, W., Fen-lin, L.( (2008): A review on Blind
  • Detection for Image Steganography, Journal of Signal Processing,Vol (88),Issue(9).
  • Pei-Chun Chen, Yung-Sheng Chen,A communication system model for digital image watermarking problems, IAENG Computer Science, 34:2, IJCS_34_2_01 http://www.iaeng.org/IJCS/issues_v34/issue_2/IJCS_34_2_01.pdf
  • http://vis.uky.edu/~cheung/courses/ee639_fall04/readings/watermarkITsurvey.pdf
  • http://www.springer.com/978-3-642-14312-0
  • http://www.hindawi.com/journals/ijvt/2012/506235/
Еще
Статья научная