首页    期刊浏览 2024年09月19日 星期四
登录注册

文章基本信息

  • 标题:A Method of Steganography – P Message With Q Coefficient (SPMQC)
  • 其他标题:A Method of Steganography – P Message With Q Coefficient (SPMQC)
  • 作者:Zeinab Famili ; Karim Faez ; Abbas Fadavi
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2013
  • 卷号:3
  • 期号:2
  • 页码:230-237
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:In this paper, we are going to propose a method for Steganography- which is based on deceiving χ2 algorithm. Since the cover image coefficients and stego image coefficients histograms have significant differences for purposes of statistical properties, statistical analysis of χ2-test reveals the existence of hidden messages inside stego image. We are introducing an idea for hiding messages in the cover image. It causes that DCT (Discrete Cosine Transforms) coefficient histogram not to have remarkable modification before and after embedding message. As a result, identifying the hidden message inside an image is impossible for an eavesdropper through χ2 -test. In this paper, we are proposing a better method with developing this algorithm. In fact, the capacity and the security of embedding messages increase extremely.DOI:http://dx.doi.org/10.11591/ijece.v3i2.2011
  • 其他摘要:In this paper, we are going to propose a method for Steganography- which is based on deceiving χ 2 algorithm. Since the cover image coefficients and stego image coefficients histograms have significant differences for purposes of statistical properties, statistical analysis of χ 2 -test reveals the existence of hidden messages inside stego image. We are introducing an idea for hiding messages in the cover image. It causes that DCT (Discrete Cosine Transforms) coefficient histogram not to have remarkable modification before and after embedding message. As a result, identifying the hidden message inside an image is impossible for an eavesdropper through χ 2 -test. In this paper, we are proposing a better method with developing this algorithm. In fact, the capacity and the security of embedding messages increase extremely. DOI: http://dx.doi.org/10.11591/ijece.v3i2.2011
  • 关键词:Computer and Informatics;Steganography; stego image; χ2 -test
Loading...
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有