{"title":"Experimental study of a novel technique of data hiding with high PSNR","authors":"S. Verdiyev, A. Naghiyeva, Ajay Kumar","doi":"10.1109/ACCESS57397.2023.10200743","DOIUrl":null,"url":null,"abstract":"The task of concealment of information is an important challenge in the context of an advance infrastructure of open and uncontrolled Internet users' communication through computer networks. Various steganographic methods have been developed to solve the problem of the protection of transmitted information. The aim of the present paper is the experimental study of the robustness of the algorithm developed by authors for the concealment of information. The reliability of the algorithm for stego analytics attacks has been investigated by the RS method of steganalysis. In addition, the computational complexity of the algorithm is investigated which in turn should not exceed a certain threshold.The results of the experimental studies demonstrate the algorithm’s high robustness and minimal computational time.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCESS57397.2023.10200743","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The task of concealment of information is an important challenge in the context of an advance infrastructure of open and uncontrolled Internet users' communication through computer networks. Various steganographic methods have been developed to solve the problem of the protection of transmitted information. The aim of the present paper is the experimental study of the robustness of the algorithm developed by authors for the concealment of information. The reliability of the algorithm for stego analytics attacks has been investigated by the RS method of steganalysis. In addition, the computational complexity of the algorithm is investigated which in turn should not exceed a certain threshold.The results of the experimental studies demonstrate the algorithm’s high robustness and minimal computational time.