{"title":"一个使用16*16量化表的信息隐藏系统","authors":"Medha Kulkarni","doi":"10.1109/EIC.2015.7230740","DOIUrl":null,"url":null,"abstract":"Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An information hiding system using 16*16 quantization table\",\"authors\":\"Medha Kulkarni\",\"doi\":\"10.1109/EIC.2015.7230740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.\",\"PeriodicalId\":101532,\"journal\":{\"name\":\"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIC.2015.7230740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIC.2015.7230740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An information hiding system using 16*16 quantization table
Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.