SEARCH ENGINEERING RESEARCH PAPERS

survey of steganographic algorithm lsb and slsb


 

SLSB: Improving the steganographic algorithm LSB
free download


JJ Roque, JM Minguet ,Proceedings The Ibero-American Congress on , 2009 ,fing.edu.uy  This table can verify that the new algorithm (in any of its three versions) offers the best results in the metrics AAD, MSE, LP, SNR, PSNR, NCC and CQ, and provide the same  6 Moskowitz, I., Johnson, N. and Jacobs, M.: A detection study of an NRL steganographic method. 

Detection of PS and Stego Images Based on Noise Models and Features Integration [J]
free download


LUOXYLIU Fen-Lin, YCFHE Xiong-Fei ,Chinese Journal of Computers, 2010 ,cjc.ict.ac.cn  and analyzed a great majority of the relevant references, made a survey on the  significant bits) steganography; and presented some universal blind detection algorithms for image steganography.  of PS images and stego images are analyzed, and a detection algorithm based on 

Modified Least Significant Bit (MLSB)
free download


MA Zaher ,Computer and Information Science, 2010 ,journal.ccsenet.org  (2010). Digital image steganography: survey and analyses of current methods signal processing.  Roque, JJ,Minguet, JM (2009). SLSB: Improving the steganographic algorithm LSB. Proceedings The Ibero-American Congress on Information Security (CIBSI). 

Survey of Steganoraphic Techniques in Network Security
free download


S Sivaraja, E Baburaj ,International Journal of Research , 2011 ,sciacademypublisher.com  Survey of Steganoraphic Techniques in Network Security  [12] Analysis of LSB based image Steganography techniques, R.Chandramouli, Nasir Memon, IEEE Conference, 2001. [13] SLSB: Improving the Steganoraphic Algorithm LSB, Juan Jose Roque, Jesus Maria Minguet.   

HASH BASED LEAST SIGNIFICANT BIT TECHNIQUE FOR VIDEO STEGANOGRAPHY (HLSB)
free download


Literature survey suggests that when temporal redundancies are used as video steganalysis then performance is more satisfactory than in spatial domain.  [16] Juan Jose Roque and Jesus Maria Minguet, SLSB: Improving the Steganographic Algorithm LSB, in the 7th 

Image Sterilization to Prevent LSB-based Steganographic Transmission
free download


G Paul, I Mukherjee ,arXiv preprint arXiv:1012.5573, 2010  [4] JJ Roque and JM Minguet, SLSB: Improving the Steganographic Algorithm LSB, Universidad Nacional  M. Goljan and R. Du, Reliable Detection of LSB Steganography in Color  and KP Subbalakshmi, Current Trends in Steganalysis: A Critical Survey, Control, Automation 

Improving LSB Algorithm Using Filtering and Matching
free download


JM Rad ,2012 ,i-rep.emu.edu.tr  2.1 Problem Definition Steganography is the process of embedding a secret message in a carrier in a hidden  2.2.1 Description LSB is a non-filtering algorithm in spatial domain.  metrics which survey difference of stego image versus cover images in different aspects. 3.3.1 AAD   

Data hiding using least significant bit approch
free download


MM Al Hadidi, YK Ibrahim, HK Ali ,Proceedings of the 15th WSEAS , 2011  Based on our study, 4-LSB substitutions is a robust method for embedding an acceptable amount of data, that's because size of embedded message to carrier's size.4 LSB embedded data, can easily be implemented and  SLSB: Improving the steganographic algorithm LSB.   

Sterilization of Stego-images through Histogram Normalization
free download


Trends in Ste- ganalysis: A Critical Survey, Control, Automation  [13] JJ Roque and JM Minguet, SLSB: Improving the Steganographic Algorithm LSB, Universidad Nacional   

An Overview of Steganography
free download


S Dickman , Madison University Infosec Techreport, Department of , 2007 ,infosec.jmu.edu  4. COMMERCIALLY AVAILABLE SOFTWARE JohnsonJohnson technology consultants maintains a website that contains a survey of more than 140 software titles that perform  For known-carrier and chosen-steganography attacks (where the algorithm used to embed   

A Novel Steganographic Algorithm and Hashing to Improve Authentication using Mobile Phones
free download


G Sumalatha, P Madhuravani  This paper presents a study of the multi factor authentication solutions using mobile phone as  To be able to compare the performance of this improvement on the LSB method, the  A Novel Steganographic Algorithm and Hashing to Improve Authentication using Mobile Phones   

A New Steganography Technique Based on Layers of Image and Sensitivity Vectors Acquiring HVS
free download


J Kaur ,ijcotjournal.org  In this study, a new image domain method, based on layers of image and block sensitivity vectors acquiring HVS features is proposed which hide the secret data within  1] Juan Jose Roque, Jesus Maria Minguet, SLSB: Improving the Steganographic Algorithm LSB?.   

Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image Reconstruction Technique for Security Systems
free download


S Sharma, P Tuli, M Nagamani, PN Girija ,IOSR Journal of ,iosrjournals.org  T. Zhuang, B. Nett and Guang-Hong Chen, Exact fan-beam image reconstruction algorithm for truncated  600 which covered most syllables of morphemes and also speaker variability purpose male and female variation study.  A Novel Approach of Text Steganography based on   

Efficient Steganography Method to Implement Selected Lease Significant Bits in Spatial Domain (SLSB–SD)
free download


SS Priya, K Mahesh, K Kuppusamy  A case study on the LSB steganalysis of natural grey-scale and color images and  Hiding a secret image in edges of images The purpose of steganography is covert communication  The paper proposes a new least significant bit embedding algorithm for hiding secret messages   

Steganografija i steganaliza digitalnih slika
free download


G Radanovic ,2010 ,os2.zemris.fer.hr  Dva su osnovna tipa steganografije: tehnicka steganografija (technical steganography) i lingvisticka steganografija (linguistic steganography).  Pseudokod jednostavne LSB metode skrivanja (simple LSB, sLSB) implementirane u okviru rada je dan na slici 4.1. 

Otpornost DFT metode oznacavanja slika na rastriranje
free download


 The most commonly used AM halftoning algorithm is clustered dot screening [14].  KB;Chowdary,CR;Venugopal,KR Patnaik,LM A secure image steganography using LSB, DCT and  [2] Cheddad,A.;Condell,J.;Curran,K.;McKevittDigitalimage steganography: Survey and analysis   

Multi-Dimensional Baker Maps for Chaos Based Image Encryption
free download


K Sai Charan ,2008 ,cs.ucr.edu  42 vii Page 11. 5.5 Partial decryption using binary-string piling algorithm, where  ments including encryption, digital signatures, message digests or message integrity code (MICs), digital watermarking, steganography etc. Note that  Page 18. Chapter 2 A Brief Survey of Literature 



FREE ENGINEERING RESEARCH PAPERS