{"title":"用ROC曲线和混淆矩阵准则分析隐写前的密码学","authors":"","doi":"10.33140/jeee.01.01.05","DOIUrl":null,"url":null,"abstract":"The steganography algorithms based on media type, format and capacity are used for different applications. The use of cryptographic algorithms also depends on the type of application. The challenge that can be investigated is the use of cryptographic algorithms in the steganography process, which must be properly scrutinized due to the special sensitivities of these two technologies. The use of cryptographic algorithms in steganographic systems increases the security of hidden data, but this security level should not make the entropy more visible and did not consider other metric. For this reason, in this paper, two steganographic algorithms for JPEG image and two steganographic algorithms for audio in WAV format are investigated, so that before the steganographic operation, a cryptography algorithm is used to encrypt the message. In the following, after reviewing the steganographic algorithms using several valid steganalysis, the advantages of using and not using these cryptographic algorithms against their disadvantages are reviewed and suggestions about their use in steganography algorithms and systems are presented.","PeriodicalId":39047,"journal":{"name":"Journal of Electrical and Electronics Engineering","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Cryptography before Steganography Operation by ROC Curves and Confusion Matrices Criteria\",\"authors\":\"\",\"doi\":\"10.33140/jeee.01.01.05\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The steganography algorithms based on media type, format and capacity are used for different applications. The use of cryptographic algorithms also depends on the type of application. The challenge that can be investigated is the use of cryptographic algorithms in the steganography process, which must be properly scrutinized due to the special sensitivities of these two technologies. The use of cryptographic algorithms in steganographic systems increases the security of hidden data, but this security level should not make the entropy more visible and did not consider other metric. For this reason, in this paper, two steganographic algorithms for JPEG image and two steganographic algorithms for audio in WAV format are investigated, so that before the steganographic operation, a cryptography algorithm is used to encrypt the message. In the following, after reviewing the steganographic algorithms using several valid steganalysis, the advantages of using and not using these cryptographic algorithms against their disadvantages are reviewed and suggestions about their use in steganography algorithms and systems are presented.\",\"PeriodicalId\":39047,\"journal\":{\"name\":\"Journal of Electrical and Electronics Engineering\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Electrical and Electronics Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33140/jeee.01.01.05\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electrical and Electronics Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33140/jeee.01.01.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
Analysis of Cryptography before Steganography Operation by ROC Curves and Confusion Matrices Criteria
The steganography algorithms based on media type, format and capacity are used for different applications. The use of cryptographic algorithms also depends on the type of application. The challenge that can be investigated is the use of cryptographic algorithms in the steganography process, which must be properly scrutinized due to the special sensitivities of these two technologies. The use of cryptographic algorithms in steganographic systems increases the security of hidden data, but this security level should not make the entropy more visible and did not consider other metric. For this reason, in this paper, two steganographic algorithms for JPEG image and two steganographic algorithms for audio in WAV format are investigated, so that before the steganographic operation, a cryptography algorithm is used to encrypt the message. In the following, after reviewing the steganographic algorithms using several valid steganalysis, the advantages of using and not using these cryptographic algorithms against their disadvantages are reviewed and suggestions about their use in steganography algorithms and systems are presented.
期刊介绍:
Journal of Electrical and Electronics Engineering is a scientific interdisciplinary, application-oriented publication that offer to the researchers and to the PhD students the possibility to disseminate their novel and original scientific and research contributions in the field of electrical and electronics engineering. The articles are reviewed by professionals and the selection of the papers is based only on the quality of their content and following the next criteria: the papers presents the research results of the authors, the papers / the content of the papers have not been submitted or published elsewhere, the paper must be written in English, as well as the fact that the papers should include in the reference list papers already published in recent years in the Journal of Electrical and Electronics Engineering that present similar research results. The topics and instructions for authors of this journal can be found to the appropiate sections.