集装箱图像轮廓中间接隐写数据隐藏方法的研究

V. Barannik, Oleg Shatun, D. Barannik, V. Kobtseva
{"title":"集装箱图像轮廓中间接隐写数据隐藏方法的研究","authors":"V. Barannik, Oleg Shatun, D. Barannik, V. Kobtseva","doi":"10.5604/01.3001.0012.8016","DOIUrl":null,"url":null,"abstract":"The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. The advantages of using data embedding in an image container are shown. The main disadvantages of the existing methods of embedding in the image container are given. The issues of JPEG image compression for digital steganography are described. The allocation of stable regions in the attacking effects on the basis of the moving mask is proposed. The mathematical apparatus for masking images by the Sobel method is shown. The indirect steganography method of hiding data in blocks which contain information about the circuit is developed.","PeriodicalId":53131,"journal":{"name":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DEVELOPMENT OF THE METHOD OF INDIRECT STEGANOGRAPHIC DATA HIDING IN THE CONTAINER IMAGE CONTOUR\",\"authors\":\"V. Barannik, Oleg Shatun, D. Barannik, V. Kobtseva\",\"doi\":\"10.5604/01.3001.0012.8016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. The advantages of using data embedding in an image container are shown. The main disadvantages of the existing methods of embedding in the image container are given. The issues of JPEG image compression for digital steganography are described. The allocation of stable regions in the attacking effects on the basis of the moving mask is proposed. The mathematical apparatus for masking images by the Sobel method is shown. The indirect steganography method of hiding data in blocks which contain information about the circuit is developed.\",\"PeriodicalId\":53131,\"journal\":{\"name\":\"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5604/01.3001.0012.8016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatyka Automatyka Pomiary w Gospodarce i Ochronie Srodowiska","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0012.8016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

本文讨论了在关键预约系统中使用数字隐写法进行信息安全的相关问题。说明了在图像容器中使用数据嵌入的优点。给出了现有图像容器嵌入方法的主要缺点。描述了用于数字隐写的JPEG图像压缩问题。提出了基于移动掩模的攻击效果中稳定区域的分配方法。给出了用索贝尔法掩模图像的数学装置。提出了一种将数据隐藏在包含电路信息的块中的间接隐写方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DEVELOPMENT OF THE METHOD OF INDIRECT STEGANOGRAPHIC DATA HIDING IN THE CONTAINER IMAGE CONTOUR
The article discusses issues related to the use of methods of digital steganography for information security in systems of critical appointment. The advantages of using data embedding in an image container are shown. The main disadvantages of the existing methods of embedding in the image container are given. The issues of JPEG image compression for digital steganography are described. The allocation of stable regions in the attacking effects on the basis of the moving mask is proposed. The mathematical apparatus for masking images by the Sobel method is shown. The indirect steganography method of hiding data in blocks which contain information about the circuit is developed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
0.90
自引率
0.00%
发文量
40
审稿时长
10 weeks
期刊最新文献
MODELING AND ANALYSIS OF SYSTOLIC AND DIASTOLIC BLOOD PRESSURE USING ECG AND PPG SIGNALS RESEARCH ON CALCULATION OPTIMIZATION METHODS USED IN COMPUTER GAMES DEVELOPMENT REMOTE SOTA ALGORITHM FOR NB-IOT WIRELESS SENSORS – IMPLEMENTATION AND RESULTS DEVELOPMENT OF A SOFTWARE SYSTEM FOR PREDICTING EMPLOYEE RATINGS PV PANEL COOLING USING STACK EFFECT
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1