An information hiding system using 16*16 quantization table

Medha Kulkarni
{"title":"An information hiding system using 16*16 quantization table","authors":"Medha Kulkarni","doi":"10.1109/EIC.2015.7230740","DOIUrl":null,"url":null,"abstract":"Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIC.2015.7230740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一个使用16*16量化表的信息隐藏系统
隐写术用于建立双方之间的安全通信。隐写分析,通过第三方检测隐写是一门相对年轻的学科。隐写分析的艺术和科学,旨在检测隐藏信息,估计隐藏信息的长度,并提取它。隐写分析最近受到了执法部门和媒体的极大关注。因此,许多学者从事这一领域的研究。近年来,JPEG格式作为主要的隐写格式引起了研究人员的关注。JPEG图像在互联网公告板和公共互联网站点上非常丰富。F5是一种基于频域的隐写算法。它具有容量大、鲁棒性好等优点,得到了广泛的应用。它将秘密数据嵌入到量化的JPEG图像的非零DCT系数中。F5算法使用矩阵编码技术来最小化所做的更改数量。使用JHRF算法解除F5嵌入的数据的隐藏。在本文中,一种信息隐藏算法JPEG,使用16 *16像素的非重叠块。通过将秘密信息按规则嵌入到JPEG图像中,JHRF可以处理更大的隐写容量。该方法能有效地处理异常数据,取得较好的处理效果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Designing customized MIPS soft-core and configuring it at run time Image inpainting on satellite image using texture synthesis & region filling algorithm Image compression using calic Segmentation of brain MR image using fuzzy local Gaussian mixture model Comprehensive analysis of various Energy detection parameters in spectrum sensing for cognitive radio systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1