期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Dynamic matrix encoding strategy for voice-over-IP steganography 被引量:5
1
作者 田晖 周可 冯丹 《Journal of Central South University》 SCIE EI CAS 2010年第6期1285-1292,共8页
In order to optionally regulate embedding capacity and embedding transparency according to user's requirements in voice-over-IP(VoIP) steganography,a dynamic matrix encoding strategy(DMES) was presented.Differing ... In order to optionally regulate embedding capacity and embedding transparency according to user's requirements in voice-over-IP(VoIP) steganography,a dynamic matrix encoding strategy(DMES) was presented.Differing from the traditional matrix encoding strategy,DMES dynamically chose the size of each message group in a given set of adoptable message sizes.The appearance possibilities of all adoptable sizes were set in accordance with the desired embedding performance(embedding rate or bit-change rate).Accordingly,a searching algorithm that could provide an optimal combination of appearance possibilities was proposed.Furthermore,the roulette wheel algorithm was employed to determine the size of each message group according to the optimal combination of appearance possibilities.The effectiveness of DMES was evaluated in StegVoIP,which is a typical covert communication system based on VoIP.The experimental results demonstrate that DMES can adjust embedding capacity and embedding transparency effectively and flexibly,and achieve the desired embedding performance in any case.For the desired embedding rate,the average errors are not more than 0.000 8,and the standard deviations are not more than 0.002 0;for the desired bit-change rate,the average errors are not more than 0.001 4,and the standard deviations are not more than 0.002 6. 展开更多
关键词 steganography embedding transparency dynamic matrix encoding strategy voice over IP
在线阅读 下载PDF
A secure image steganography algorithm based on least significant bit and integer wavelet transform 被引量:4
2
作者 ELSHAZLY Emad ABDELWAHAB Safey +3 位作者 ABOUZAID Refaat ZAHRAN Osama ELARABY Sayed ELKORDY Mohamed 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第3期639-649,共11页
The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a... The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a way that it is invisible to human eyes. The cover object can be image, text, audio,or video. This paper proposes a secure steganography algorithm that hides a bitstream of the secret text into the least significant bits(LSBs) of the approximation coefficients of the integer wavelet transform(IWT) of grayscale images as well as each component of color images to form stego-images. The embedding and extracting phases of the proposed steganography algorithms are performed using the MATLAB software. Invisibility, payload capacity, and security in terms of peak signal to noise ratio(PSNR) and robustness are the key challenges to steganography. The statistical distortion between the cover images and the stego-images is measured by using the mean square error(MSE) and the PSNR, while the degree of closeness between them is evaluated using the normalized cross correlation(NCC). The experimental results show that, the proposed algorithms can hide the secret text with a large payload capacity with a high level of security and a higher invisibility. Furthermore, the proposed technique is computationally efficient and better results for both PSNR and NCC are achieved compared with the previous algorithms. 展开更多
关键词 image steganography image processing integer wavelet transform
在线阅读 下载PDF
Information hiding with adaptive steganography based on novel fuzzy edge identification 被引量:2
3
作者 Sanjeev Kumar Amarpal Singh Manoj Kumar 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2019年第2期162-169,共8页
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ... The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain. 展开更多
关键词 Information security ADAPTIVE steganography FUZZY EDGE detection PATTERN RECOGNITION
在线阅读 下载PDF
Steganography based on wavelet transform and modulus function 被引量:1
4
作者 Kang Zhiwei Liu Jing He Yigang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期628-632,共5页
In order to provide larger capacity of the hidden secret data while maintaining a good visual quality of stego-image, in accordance with the visual property that human eyes are less sensitive to strong texture, a nove... In order to provide larger capacity of the hidden secret data while maintaining a good visual quality of stego-image, in accordance with the visual property that human eyes are less sensitive to strong texture, a novel steganographic method based on wavelet and modulus function is presented. First, an image is divided into blocks of prescribed size, and every block is decomposed into one-level wavelet. Then, the capacity of the hidden secret data is decided with the number of wavelet coefficients of larger magnitude. Finally, secret information is embedded by steganography based on modulus function. From the experimental results, the proposed method hides much more information and maintains a good visual quality of stego-image. Besides, the embedded data can be extracted from the stego-image without referencing the original image. 展开更多
关键词 steganography capacity wavelet transform modulus function HVS.
在线阅读 下载PDF
Frame-bitrate-change based steganography for voice-over-IP 被引量:4
5
作者 刘进 田晖 周可 《Journal of Central South University》 SCIE EI CAS 2014年第12期4544-4552,共9页
Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on fr... Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for Vo IP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading(BD) and bitrate switching(BS)are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system Steg Vo IP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of Vo IP communication. 展开更多
关键词 covert communication steganography multi-rate speech codec voice-over-IP(VOIP)
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部