Cryptography and Steganography in Digital Images / Najlacnejšie knihy
Cryptography and Steganography in Digital Images

Kód: 18791495

Cryptography and Steganography in Digital Images

Autor Wassim Al Chamaa

Master's Thesis from the year 2009 in the subject Computer Science - IT-Security, grade: 19.61 / 20, , language: English, abstract: Cryptography is one of the technological means that provides protection to digital data being tran ... celý popis

90.41


Skladom u dodávateľa
Odosielame za 14 - 18 dní
Pridať medzi želanie

Mohlo by sa vám tiež páčiť

Darčekový poukaz: Radosť zaručená
  1. Darujte poukaz v ľubovoľnej hodnote, a my sa postaráme o zvyšok.
  2. Poukaz sa vzťahuje na všetky produkty v našej ponuke.
  3. Elektronický poukaz si vytlačíte z e-mailu a môžete ho ihneď darovať.
  4. Platnosť poukazu je 12 mesiacov od dátumu vystavenia.

Objednať darčekový poukazViac informácií

Viac informácií o knihe Cryptography and Steganography in Digital Images

Nákupom získate 225 bodov

Anotácia knihy

Master's Thesis from the year 2009 in the subject Computer Science - IT-Security, grade: 19.61 / 20, , language: English, abstract: Cryptography is one of the technological means that provides protection to digital data being transmitted on communications systems. It provides methods of converting data into an unreadable form, while the Steganography is a technique by which the secret digital data is sent from one place to other by hiding it within a digital cover so the existence of secret data is concealed. The data to be hidden takes the form of any bit stream while the digital cover can be a digital image, audio, or video file. Combining Cryptography and Steganography provides two layers protection, the former encrypts the secret message so it becomes unreadable; the latter hides the encrypted message into a digital cover so it cannot be seen. In this thesis, we do a general tour of cryptography concepts and algorithms but we do a deep work on Steganography using JPEG images. Since JPEG format is the most frequently used through the internet, it is desirable to study some Steganographic techniques based on JPEG format. Chapter 2 presents the JPEG structure and the related subjects; DCT transformation, and entropy coding. Chapter 3 presents some important DCT-based methods like F3, F5, and Mod4 and shows their properties and features. Chapter 4 presents a comparison study between DCT-based steganographic methods F5 and Mod4, the study was completed using Matlab software written for F5 and Mod4 algorithms. In this study, three steganographic requirements are considered; insertion capacity, image quality, and statistical properties. The study shows that F5_111 has big insertion capacity but it could be detected easily while Mod4 has small insertion capacity but it can not be detected easily. The study shows that F5_ME takes a middle position between the considered algorithms. A magic triangle model is illustrated in order to compare visually between the considered algorithms. Chapter 5 shows the shrinkage phenomenon occurring during the embedding process of F5; it presents all the effects of shrinkage in the F5 algorithm. In order to reduce the shrinkage rate, a new method F5_MOS is proposed, F5_MOS controls the shrinkage rate by building a Map Of Shrinkage. A comparison study is done between the F5_MOS and the traditional F5_ME considering the main steganographic requirements. The comparison shows how F5_MOS provides more insertion capacity and how it makes the hidden message more undetectable.

Parametre knihy

Zaradenie knihy Knihy po anglicky Computing & information technology Computer networking & communications

90.41

Obľúbené z iného súdka



Osobný odber Bratislava a 2642 dalších

Copyright ©2008-24 najlacnejsie-knihy.sk Všetky práva vyhradenéSúkromieCookies


Môj účet: Prihlásiť sa
Všetky knihy sveta na jednom mieste. Navyše za skvelé ceny.

Nákupný košík ( prázdny )

Vyzdvihnutie v Zásielkovni
zadarmo nad 59,99 €.

Nachádzate sa: