{"title":"一种新的高信噪比数据隐藏技术的实验研究","authors":"S. Verdiyev, A. Naghiyeva, Ajay Kumar","doi":"10.1109/ACCESS57397.2023.10200743","DOIUrl":null,"url":null,"abstract":"The task of concealment of information is an important challenge in the context of an advance infrastructure of open and uncontrolled Internet users' communication through computer networks. Various steganographic methods have been developed to solve the problem of the protection of transmitted information. The aim of the present paper is the experimental study of the robustness of the algorithm developed by authors for the concealment of information. The reliability of the algorithm for stego analytics attacks has been investigated by the RS method of steganalysis. In addition, the computational complexity of the algorithm is investigated which in turn should not exceed a certain threshold.The results of the experimental studies demonstrate the algorithm’s high robustness and minimal computational time.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Experimental study of a novel technique of data hiding with high PSNR\",\"authors\":\"S. Verdiyev, A. Naghiyeva, Ajay Kumar\",\"doi\":\"10.1109/ACCESS57397.2023.10200743\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The task of concealment of information is an important challenge in the context of an advance infrastructure of open and uncontrolled Internet users' communication through computer networks. Various steganographic methods have been developed to solve the problem of the protection of transmitted information. The aim of the present paper is the experimental study of the robustness of the algorithm developed by authors for the concealment of information. The reliability of the algorithm for stego analytics attacks has been investigated by the RS method of steganalysis. In addition, the computational complexity of the algorithm is investigated which in turn should not exceed a certain threshold.The results of the experimental studies demonstrate the algorithm’s high robustness and minimal computational time.\",\"PeriodicalId\":345351,\"journal\":{\"name\":\"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACCESS57397.2023.10200743\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCESS57397.2023.10200743","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Experimental study of a novel technique of data hiding with high PSNR
The task of concealment of information is an important challenge in the context of an advance infrastructure of open and uncontrolled Internet users' communication through computer networks. Various steganographic methods have been developed to solve the problem of the protection of transmitted information. The aim of the present paper is the experimental study of the robustness of the algorithm developed by authors for the concealment of information. The reliability of the algorithm for stego analytics attacks has been investigated by the RS method of steganalysis. In addition, the computational complexity of the algorithm is investigated which in turn should not exceed a certain threshold.The results of the experimental studies demonstrate the algorithm’s high robustness and minimal computational time.