An information hiding system using 16*16 quantization table

Medha Kulkarni
{"title":"An information hiding system using 16*16 quantization table","authors":"Medha Kulkarni","doi":"10.1109/EIC.2015.7230740","DOIUrl":null,"url":null,"abstract":"Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIC.2015.7230740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.
一个使用16*16量化表的信息隐藏系统
隐写术用于建立双方之间的安全通信。隐写分析,通过第三方检测隐写是一门相对年轻的学科。隐写分析的艺术和科学,旨在检测隐藏信息,估计隐藏信息的长度,并提取它。隐写分析最近受到了执法部门和媒体的极大关注。因此,许多学者从事这一领域的研究。近年来,JPEG格式作为主要的隐写格式引起了研究人员的关注。JPEG图像在互联网公告板和公共互联网站点上非常丰富。F5是一种基于频域的隐写算法。它具有容量大、鲁棒性好等优点,得到了广泛的应用。它将秘密数据嵌入到量化的JPEG图像的非零DCT系数中。F5算法使用矩阵编码技术来最小化所做的更改数量。使用JHRF算法解除F5嵌入的数据的隐藏。在本文中,一种信息隐藏算法JPEG,使用16 *16像素的非重叠块。通过将秘密信息按规则嵌入到JPEG图像中,JHRF可以处理更大的隐写容量。该方法能有效地处理异常数据,取得较好的处理效果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信