用ROC曲线和混淆矩阵准则分析隐写前的密码学

{"title":"用ROC曲线和混淆矩阵准则分析隐写前的密码学","authors":"","doi":"10.33140/jeee.01.01.05","DOIUrl":null,"url":null,"abstract":"The steganography algorithms based on media type, format and capacity are used for different applications. The use of cryptographic algorithms also depends on the type of application. The challenge that can be investigated is the use of cryptographic algorithms in the steganography process, which must be properly scrutinized due to the special sensitivities of these two technologies. The use of cryptographic algorithms in steganographic systems increases the security of hidden data, but this security level should not make the entropy more visible and did not consider other metric. For this reason, in this paper, two steganographic algorithms for JPEG image and two steganographic algorithms for audio in WAV format are investigated, so that before the steganographic operation, a cryptography algorithm is used to encrypt the message. In the following, after reviewing the steganographic algorithms using several valid steganalysis, the advantages of using and not using these cryptographic algorithms against their disadvantages are reviewed and suggestions about their use in steganography algorithms and systems are presented.","PeriodicalId":39047,"journal":{"name":"Journal of Electrical and Electronics Engineering","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Cryptography before Steganography Operation by ROC Curves and Confusion Matrices Criteria\",\"authors\":\"\",\"doi\":\"10.33140/jeee.01.01.05\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The steganography algorithms based on media type, format and capacity are used for different applications. The use of cryptographic algorithms also depends on the type of application. The challenge that can be investigated is the use of cryptographic algorithms in the steganography process, which must be properly scrutinized due to the special sensitivities of these two technologies. The use of cryptographic algorithms in steganographic systems increases the security of hidden data, but this security level should not make the entropy more visible and did not consider other metric. For this reason, in this paper, two steganographic algorithms for JPEG image and two steganographic algorithms for audio in WAV format are investigated, so that before the steganographic operation, a cryptography algorithm is used to encrypt the message. In the following, after reviewing the steganographic algorithms using several valid steganalysis, the advantages of using and not using these cryptographic algorithms against their disadvantages are reviewed and suggestions about their use in steganography algorithms and systems are presented.\",\"PeriodicalId\":39047,\"journal\":{\"name\":\"Journal of Electrical and Electronics Engineering\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Electrical and Electronics Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33140/jeee.01.01.05\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electrical and Electronics Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33140/jeee.01.01.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

基于介质类型、格式和容量的隐写算法被用于不同的应用。加密算法的使用也取决于应用程序的类型。可以调查的挑战是在隐写过程中使用加密算法,由于这两种技术的特殊敏感性,必须对其进行适当的审查。在隐写系统中使用加密算法增加了隐藏数据的安全性,但这种安全级别不应该使熵更明显,并且没有考虑其他度量。为此,本文研究了JPEG图像的两种隐写算法和WAV格式音频的两种隐写算法,以便在隐写操作之前,先使用一种加密算法对消息进行加密。下面,在回顾了使用几种有效隐写分析的隐写算法之后,对使用和不使用这些加密算法的优点以及它们的缺点进行了回顾,并提出了在隐写算法和系统中使用它们的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Analysis of Cryptography before Steganography Operation by ROC Curves and Confusion Matrices Criteria
The steganography algorithms based on media type, format and capacity are used for different applications. The use of cryptographic algorithms also depends on the type of application. The challenge that can be investigated is the use of cryptographic algorithms in the steganography process, which must be properly scrutinized due to the special sensitivities of these two technologies. The use of cryptographic algorithms in steganographic systems increases the security of hidden data, but this security level should not make the entropy more visible and did not consider other metric. For this reason, in this paper, two steganographic algorithms for JPEG image and two steganographic algorithms for audio in WAV format are investigated, so that before the steganographic operation, a cryptography algorithm is used to encrypt the message. In the following, after reviewing the steganographic algorithms using several valid steganalysis, the advantages of using and not using these cryptographic algorithms against their disadvantages are reviewed and suggestions about their use in steganography algorithms and systems are presented.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Electrical and Electronics Engineering
Journal of Electrical and Electronics Engineering Engineering-Electrical and Electronic Engineering
CiteScore
0.90
自引率
0.00%
发文量
0
审稿时长
16 weeks
期刊介绍: Journal of Electrical and Electronics Engineering is a scientific interdisciplinary, application-oriented publication that offer to the researchers and to the PhD students the possibility to disseminate their novel and original scientific and research contributions in the field of electrical and electronics engineering. The articles are reviewed by professionals and the selection of the papers is based only on the quality of their content and following the next criteria: the papers presents the research results of the authors, the papers / the content of the papers have not been submitted or published elsewhere, the paper must be written in English, as well as the fact that the papers should include in the reference list papers already published in recent years in the Journal of Electrical and Electronics Engineering that present similar research results. The topics and instructions for authors of this journal can be found to the appropiate sections.
期刊最新文献
Optimal Operation of a Village Energy System Considering Renewable Resources and Battery Energy Storage Cascade Control Applied to a Single-Component Single-Stage Vaporizer—Modeling and Simulation Wireless Sensor Network Based Gas Monitoring System Utilizing ZigBee Technology Dynamic Modeling and Chaos Suppression of the Permanent Magnet Synchronous Motor Drive with Sliding Mode Control Modeling and Implementation of a Specific Microprocessor to Enhance the Performance of PLCs Employing FPGAs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1