2. Definition & Classification
|
|
- Alban Norton
- 5 years ago
- Views:
Transcription
1 Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations
2 Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret messages within other innocuous information Digital images, audio, video, etc Concealing their existence Encryption Secure method of communication Protecting the contents of messages 4 Embeds data into digital media for the purpose of identification, annotation and copyright Cover Image Secret Data Stego Image (Image, Text,...)
3 Hierarchical Classification 5 Embedding Model 6
4 Category of Data Hiding 7 Irreversible Least Significant Bit (LSB) Substitution Pixel-Value l Differencing i (PVD) Reversible Recovery of the original image by extracting the embedded information from the stego- image Distortion-free, lossless, invertible Histogram Shifting Difference Expansion (DE) 1. Least Significant Bit Substitution p p Cover image - gray : 1pixel = 8bits (value : 0 ~ 255)... Secret Data : p p irreversible
5 2. Pixel-Value Differencing 9 Embedding algorithm Range table Range F = ( P, P ) = (50, 61) i (, i x) (, i y) di = P(, i y) P(, i x) = = 11 d ' i ' l j + ti for d 0 = + < ' ( l j ti) for d 0 l t = log( w ) j R 1 = [0,7] R 2 = [8,15] R 3 = [16,31] R 4 = [32,63] R 5 = [64,127] R 6 = [128,255] Secret message u j w j t i = 5 10 = = 13 i j m = d - d = = 2 irreversible 10 Embedding algorithm d i = 11 ' ' P(, ix) m/ 2, P(, iy) + m/ 2 for odd di ( P(, ix), P(, iy) ) = P m/ 2, P + m/ 2 for even d Recall: (, ix) (, iy) i ( P, P ) = (50, 61) m = 2 (, i x) (, i y) = (49, 62) Extracting algorithm d = P P = = 13 ' ' ' i (, i y) (, i x) Range table ' ' = Range l j u j w j ti log( wj) ' di lj for di 0 ti = = 13-8 = 5 ' ' d for 0 R 1 = [0,7] i lj di < 10 R 2 = [8,15] R 3 = [16,31] Extracted Secret message R 4 = [32,63] R 5 = [64,127] R 6 = [128,255]
6 1. by Histogram Shifting Cover image Peak point, a=3 Zero point, b=6 Count secret bits Stego image Pixel value Peak point Zero point reversible 2. Using a Difference Expansion 12 Embedding (x, y) = l = = = 203, h= = h' = 2 h+ b= = x' = = 209, y' = 203 = Extracting 5 = 101 (2) 5 2 = 1010(2) = l' = l : it integer average between bt two pixels 203, = h = = h : difference value between two pixels h' b= LSB( h') = 1, h= = 5 b : secret bit 2 h x= l + = = h 5 y = l = = (2) reversible
7 Basic Measurement 13 Visual Quality PSNR (Peak Signal to Noise Ratio) PSNR = 10 x log / MSE M-1 N-1 MSE = (p(x,y) - p'(x,y)) 2 / M x N x=0 y=0 Quality Index Capacity 1. 가변길이자료은닉이가능한이미지스테가노그래픽방법 14 Motives Fall-off the boundary problem Wu and Tsai s s Pixel-Value Differencing (PVD) Chang and Tseng s Side-Match Method
8 Review of Pixel-value Differencing 15 가변길이자료은닉이가능한이미지스테가노그래픽방법 Review of Two Side-match Method 16 가변길이자료은닉이가능한이미지스테가노그래픽방법
9 Fall-off the Boundary Problem 17 가변길이자료은닉이가능한이미지스테가노그래픽방법 Fall-off the Boundary Problem 18 Case 1. d = (g u + g l ) / 2 - g x > 1 가변길이자료은닉이가능한이미지스테가노그래픽방법
10 Fall-off the Boundary Problem 19 Case 2. d = (g u + g l ) / 2 - g x < 1 가변길이자료은닉이가능한이미지스테가노그래픽방법 Proposed Method 20 d 0 가변길이자료은닉이가능한이미지스테가노그래픽방법
11 Proposed Method 21 d <0 가변길이자료은닉이가능한이미지스테가노그래픽방법 2. 이진이미지에대한픽셀값가중치를이용한자료은닉기법연구 22 Motives Hiding data in binary image is more challenging than any other formats Two primary methods for binary images Sub-block block modification Single pixel manipulation
12 Proposed Method 23 A sub-block of cover Weighted Value w w x = (1x0 + 2x1 + 1x1) + (-1x1 + -2x0 + -1x0) = (-1) = 2 y = (-1x0 + -2x0 + -1x1) + (1x1 + 2x1 + 1x0) = = 2 w2 = x + y = = 4 이진이미지에대한픽셀값가중치를이용한자료은닉기법연구 24 Additional Topics
13 Application in Military 25 Military and intelligence agencies require unobtrusive communications. Even if the content is encrypted, the detection of a signal on a modern battlefield may lead rapidly to an attack on the signaller. For this reason, military communications use techniques such as spread spectrum modulation or meteor scatter transmission to make signals hard for the enemy to detect or jam Spread spectrum radio techniques have been developed for military applications since the mod-1940 s because of their antijamming and low-probability-of-intercept properties R. C. Dixon, Spread spectrum systems with commercial applications, New York, John Wiley & Sons, 1994 R. A. Scholtz, The origins of spread spectrum communcations, IEEE Transactions on Communications, Vol. 30, No. 5, pp , 1982 R. L. Pickholtz, D. L. Schilling, L. B. Milstein, Theory of spread spectrum communications a tutorial, IEEE Transactions on Communications, Vol. 30., No. 5, pp , 1982 Data Hiding Using Image Interpolation 26 Computer Standards & Interfaces, vol. 31, pp , 2009
14 Data Hiding Using Run Length Matching 27 Matching Case International Journal of Intelligent Information and Database Systems, 28 Non-matching Case International Journal of Intelligent Information and Database Systems,
15 Data Hiding Method with Quality Control lf for Binary Images 29 Embedding Journal of Software Engineering and Applications, pp.20-24, Extracting Journal of Software Engineering and Applications, pp.20-24,
16 Improved Exploiting Modification Direction i Method by Modulus Operation 31 Embedding International Journal of Signal Processing, Image Processing and Pattern, pp.79-88, Extracting International Journal of Signal Processing, Image Processing and Pattern, pp.79-88,
17 Experiments 33 Considerations 34 IBM 11 ~ 12 pages Elsevier 25 ~ 30 pages Abstract 4 sentences Abstract 1 paragraph Introduction 1 page Introduction 1.5 ~ 2 manuscript pages Problem 1 page Methods 2 ~ 4 pages My idea 2 pages Results & Discussion 10 ~ 12 pages The details 5 pages Conclusions 1 ~ 2 pages Related work Conclusion & further work 1~2 pages 0.5 page Remark : o double space, 12 pt o Figures 6~8 Tables 1~3 References 20~50 items
Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
Applied Mathematics Volume 013, Article ID 189706, 8 pages http://dx.doi.org/10.1155/013/189706 Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
More informationQuantization Index Modulation using the E 8 lattice
1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:
More informationA Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid
More informationNEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION
NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION Sos S. Agaian 1 and Juan P. Perez 2 1NSP Lab, The University of Texas at San Antonio, Electrical Engineering Department,
More informationQISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit
06 International Conference on Mathematical, Computational and Statistical Sciences and Engineering (MCSSE 06) ISBN: 978--60595-396-0 QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant
More informationA Modified Moment-Based Image Watermarking Method Robust to Cropping Attack
A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia
More informationNew Steganographic scheme based of Reed- Solomon codes
New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;
More informationImproved Adaptive LSB Steganography based on Chaos and Genetic Algorithm
Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Lifang Yu, Yao Zhao 1, Rongrong Ni, Ting Li Institute of Information Science, Beijing Jiaotong University, BJ 100044, China Abstract
More informationStudy of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking
Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,
More informationResearch Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2010, Article ID 876946, 6 pages doi:10.1155/2010/876946 Research Article Improved Adaptive LSB Steganography Based
More informationHiding Data in a QImage File
Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has
More informationCapacity-Approaching Codes for Reversible Data Hiding
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang 1,2,BiaoChen 1, and Nenghai Yu 1, 1 Department of Electrical Engineering & Information Science, University of Science and Technology
More informationA Knapsack Cryptosystem Based on The Discrete Logarithm Problem
A Knapsack Cryptosystem Based on The Discrete Logarithm Problem By K.H. Rahouma Electrical Technology Department Technical College in Riyadh Riyadh, Kingdom of Saudi Arabia E-mail: kamel_rahouma@yahoo.com
More informationWavelet Packet Based Digital Image Watermarking
Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in
More information5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017
5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-secret Image Sharing Long Bao, Student Member, IEEE, Shuang
More informationAS A TECHNIQUE that embeds the secret message
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 7, JULY 2013 2775 Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression Weiming Zhang,
More information1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.
Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Lesson 7 Delta Modulation and DPCM Instructional Objectives At the end of this lesson, the students should be able to: 1. Describe a lossy predictive coding scheme.
More informationAsymmetric Encryption
-3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function
More informationReversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery
S S symmetry Article Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery Sunghwan Kim School of Electrical Engineering, University of
More informationInformation Hiding and Covert Communication
Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design
More informationDigital Image Watermarking Algorithm Based on Wavelet Packet
www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department
More informationQuantitative Steganalysis of LSB Embedding in JPEG Domain
Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding
More informationarxiv: v2 [cs.cr] 6 Aug 2017
Cryptanalyzing an Image Scrambling Encryption Algorithm of Pixel Bits Chengqing Li a,, Dongdong Lin a, Jinhu Lü b a Hunan Province Cooperative Innovation Center for Wind Power Equipment and Energy Conversion,
More informationImplementation of Lossless Huffman Coding: Image compression using K-Means algorithm and comparison vs. Random numbers and Message source
Implementation of Lossless Huffman Coding: Image compression using K-Means algorithm and comparison vs. Random numbers and Message source Ali Tariq Bhatti 1, Dr. Jung Kim 2 1,2 Department of Electrical
More information19. Coding for Secrecy
19. Coding for Secrecy 19.1 Introduction Protecting sensitive information from the prying eyes and ears of others is an important issue today as much as it has been for thousands of years. Government secrets,
More informationBilingual Information Hiding System: A Formalized Approach
Bilingual Information Hiding System: A Formalized Approach 1 Riad Jabri, 2 Boran Ibrahim Faculty of Information Technology, Computer Science Department, University of Jordan, Amman, Jordan jabri@ju.eu.jo;
More informationLearning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding
Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in
More informationStego key searching for LSB steganography on JPEG decompressed image
. RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU
More informationDetecting LSB Matching by Applying Calibration Technique for Difference Image
Detecting LSB atching by Applying Calibration Technique for Difference Image iaolong Li Institute of Computer Science & Technology Peking University 87, Beijing, P. R. China lixiaolong@icst.pku.edu.cn
More informationMatrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography
Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,
More informationFPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory
FPGA Implementation of Pseudo Noise Sequences based on Quadratic Residue Theory A. Rajagopal Dept. of E&C, K.L. Sudha Dept.of E&C, Dundi Ajay Dept. of E&C, ABSTRACT Pseudo Noise (PN) sequences are defined
More informationLecture 5. Ideal and Almost-Ideal SG.
Lecture 5. Ideal and Almost-Ideal SG. Definition. SG is called ideal (perfect or unconditionally undetectable ISG),if its detection is equivalently to random guessing of this fact even with the use of
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More informationLecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments
Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP9519 Multimedia Systems S2 2006 jzhang@cse.unsw.edu.au
More informationL7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015
L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm
More informationMulti-scale Geometric Summaries for Similarity-based Upstream S
Multi-scale Geometric Summaries for Similarity-based Upstream Sensor Fusion Duke University, ECE / Math 3/6/2019 Overall Goals / Design Choices Leverage multiple, heterogeneous modalities in identification
More informationImplementation of the RSA algorithm and its cryptanalysis. Abstract. Introduction
Implementation of the RSA algorithm and its cryptanalysis Chandra M. Kota and Cherif Aissi 1 University of Louisiana at Lafayette, College of Engineering Lafayette, LA 70504, USA Abstract Session IVB4
More informationMPSteg-color: a new steganographic technique for color images
MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it
More informationHalftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion
1 Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion Yuanfang Guo, Member, IEEE, Oscar C. Au, Fellow, IEEE, Rui Wang, Member, IEEE, Lu Fang, Member, IEEE, Xiaochun Cao,
More informationLecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments. Tutorial 1. Acknowledgement and References for lectures 1 to 5
Lecture : Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments Dr. Jian Zhang Conjoint Associate Professor NICTA & CSE UNSW COMP959 Multimedia Systems S 006 jzhang@cse.unsw.edu.au Acknowledgement
More informationNumber theory (Chapter 4)
EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?
More informationImage Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT
Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a
More informationLemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).
1 Background 1.1 The group of units MAT 3343, APPLIED ALGEBRA, FALL 2003 Handout 3: The RSA Cryptosystem Peter Selinger Let (R, +, ) be a ring. Then R forms an abelian group under addition. R does not
More informationNEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST
IGOR BELI^, ALEKSANDER PUR NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST There are several problems where it is very important to know whether the tested data are distributed according to the
More informationPerformance Evaluation of an Advanced Man-in-the-Middle Attack Against Certain HB Authentication Protocols
Performance Evaluation of an Advanced Man-in-the-Middle Attack Against Certain HB Authentication Protocols Miodrag Mihaljević, Siniša Tomović and Milica Knežević Mathematical Institute of Serbian Academy
More informationDigital communication system. Shannon s separation principle
Digital communication system Representation of the source signal by a stream of (binary) symbols Adaptation to the properties of the transmission channel information source source coder channel coder modulation
More informationFisher Information Determines Capacity of ε-secure Steganography
Fisher Information Determines Capacity of ε-secure Steganography Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt,
More informationA New Trapdoor in Modular Knapsack Public-Key Cryptosystem
A New Trapdoor in Modular Knapsack Public-Key Cryptosystem Takeshi Nasako Yasuyuki Murakami Abstract. Merkle and Hellman proposed a first knapsack cryptosystem. However, it was broken because the density
More informationISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security
The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian
More informationCosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks
1 Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks Michael Albert michael.albert@cs.otago.ac.nz 2 This week Arithmetic Knapsack cryptosystems Attacks on knapsacks Some
More informationRotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract
Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image
More informationBinary GH Sequences for Multiparty Communication. Krishnamurthy Kirthi
Binary GH Sequences for Multiparty Communication Krishnamurthy Kirthi Abstract This paper investigates cross correlation properties of sequences derived from GH sequences modulo p, where p is a prime number
More informationGeometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix
Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and
More informationIntroduction to Cryptology. Lecture 2
Introduction to Cryptology Lecture 2 Announcements 2 nd vs. 1 st edition of textbook HW1 due Tuesday 2/9 Readings/quizzes (on Canvas) due Friday 2/12 Agenda Last time Historical ciphers and their cryptanalysis
More informationCompression methods: the 1 st generation
Compression methods: the 1 st generation 1998-2017 Josef Pelikán CGG MFF UK Praha pepca@cgg.mff.cuni.cz http://cgg.mff.cuni.cz/~pepca/ Still1g 2017 Josef Pelikán, http://cgg.mff.cuni.cz/~pepca 1 / 32 Basic
More informationLecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures
Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures Boaz Barak November 27, 2007 Quick review of homework 7 Existence of a CPA-secure public key encryption scheme such that oracle
More informationComplete characterization of perfectly secure stego-systems with mutually independent embedding operation
Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,
More informationat Some sort of quantization is necessary to represent continuous signals in digital form
Quantization at Some sort of quantization is necessary to represent continuous signals in digital form x(n 1,n ) x(t 1,tt ) D Sampler Quantizer x q (n 1,nn ) Digitizer (A/D) Quantization is also used for
More information- An Image Coding Algorithm
- An Image Coding Algorithm Shufang Wu http://www.sfu.ca/~vswu vswu@cs.sfu.ca Friday, June 14, 2002 22-1 Agenda Overview Discrete Wavelet Transform Zerotree Coding of Wavelet Coefficients Successive-Approximation
More informationA DPA attack on RSA in CRT mode
A DPA attack on RSA in CRT mode Marc Witteman Riscure, The Netherlands 1 Introduction RSA is the dominant public key cryptographic algorithm, and used in an increasing number of smart card applications.
More informationResearch Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking
Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 5 Other Coding Techniques Instructional Objectives At the end of this lesson, the students should be able to:. Convert a gray-scale image into bit-plane
More informationOptimal XOR based (2,n)-Visual Cryptography Schemes
Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:
More informationGurgen Khachatrian Martun Karapetyan
34 International Journal Information Theories and Applications, Vol. 23, Number 1, (c) 2016 On a public key encryption algorithm based on Permutation Polynomials and performance analyses Gurgen Khachatrian
More informationUNIT I INFORMATION THEORY. I k log 2
UNIT I INFORMATION THEORY Claude Shannon 1916-2001 Creator of Information Theory, lays the foundation for implementing logic in digital circuits as part of his Masters Thesis! (1939) and published a paper
More informationResearch, Development and Simulation of Quantum Cryptographic Protocols
http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:
More information2 Description of McEliece s Public-Key Cryptosystem
1 A SOFTWARE IMPLEMENTATION OF THE McELIECE PUBLIC-KEY CRYPTOSYSTEM Bart Preneel 1,2, Antoon Bosselaers 1, René Govaerts 1 and Joos Vandewalle 1 A software implementation of the McEliece public-key cryptosystem
More informationSteganalysis of ±k Steganography based on Noncausal Linear Predictor
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, 9(5):623-632, October, 2014. Steganalysis of ±k Steganography based on Noncausal Linear Predictor K.M. Singh, Y.J. Chanu, T.
More informationTransitive Signatures Based on Non-adaptive Standard Signatures
Transitive Signatures Based on Non-adaptive Standard Signatures Zhou Sujing Nanyang Technological University, Singapore, zhousujing@pmail.ntu.edu.sg Abstract. Transitive signature, motivated by signing
More informationSteganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory
Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University
More informationCryptography and Security Final Exam
Cryptography and Security Final Exam Serge Vaudenay 17.1.2017 duration: 3h no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices are not
More informationSIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding
SIGNAL COMPRESSION 8. Lossy image compression: Principle of embedding 8.1 Lossy compression 8.2 Embedded Zerotree Coder 161 8.1 Lossy compression - many degrees of freedom and many viewpoints The fundamental
More information17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.
( c ) E p s t e i n, C a r t e r, B o l l i n g e r, A u r i s p a C h a p t e r 17: I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science 17.1 Binary Codes Normal numbers we use
More informationConcurrent Error Detection in S-boxes 1
International Journal of Computer Science & Applications Vol. 4, No. 1, pp. 27 32 2007 Technomathematics Research Foundation Concurrent Error Detection in S-boxes 1 Ewa Idzikowska, Krzysztof Bucholc Poznan
More informationIntroduction to Side Channel Analysis. Elisabeth Oswald University of Bristol
Introduction to Side Channel Analysis Elisabeth Oswald University of Bristol Outline Part 1: SCA overview & leakage Part 2: SCA attacks & exploiting leakage and very briefly Part 3: Countermeasures Part
More informationON SCALABLE CODING OF HIDDEN MARKOV SOURCES. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose
ON SCALABLE CODING OF HIDDEN MARKOV SOURCES Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California, Santa Barbara, CA, 93106
More informationThe Secrets of Quantization. Nimrod Peleg Update: Sept. 2009
The Secrets of Quantization Nimrod Peleg Update: Sept. 2009 What is Quantization Representation of a large set of elements with a much smaller set is called quantization. The number of elements in the
More informationfunctions. E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS**
Security Analysis of Cryptographic Algorithms by means of Boolean Functions E.G.BARDIS*, N.G.BARDIS*, A.P.MARKOVSKI*, A.K.SPYROPOULOS** * Department of Computer Science National Technical University of
More informationChapter 4 Asymmetric Cryptography
Chapter 4 Asymmetric Cryptography Introduction Encryption: RSA Key Exchange: Diffie-Hellman [NetSec/SysSec], WS 2008/2009 4.1 Asymmetric Cryptography General idea: Use two different keys -K and +K for
More informationAsymmetric Cryptography
Asymmetric Cryptography Chapter 4 Asymmetric Cryptography Introduction Encryption: RSA Key Exchange: Diffie-Hellman General idea: Use two different keys -K and +K for encryption and decryption Given a
More informationA New Quantum Watermarking Based on Quantum Wavelet Transforms
Commun. Theor. Phys. 67 207 732 742 Vol. 67, No. 6, June, 207 A New Quantum Watermarking Based on Quantum Wavelet Transforms Shahrokh Heidari, Mosayeb Naseri, 2, Reza Gheibi, 3 Masoud Baghfalaki, 4 Mohammad
More informationImplementation Tutorial on RSA
Implementation Tutorial on Maciek Adamczyk; m adamczyk@umail.ucsb.edu Marianne Magnussen; mariannemagnussen@umail.ucsb.edu Adamczyk and Magnussen Spring 2018 1 / 13 Overview Implementation Tutorial Introduction
More informationData-Hiding Capacities of Non-Redundant Complex Wavelets
Data-Hiding Capacities of Non-Redundant Complex Wavelets Lahouari Ghouti School of Computer Science, Queen's University of Belfast. Belfast BT7 INN, United ingdom. Email: L.Ghouti@qub.ac.uk eywords: Digital
More informationIntroduction to Modern Cryptography. Benny Chor
Introduction to Modern Cryptography Benny Chor RSA Public Key Encryption Factoring Algorithms Lecture 7 Tel-Aviv University Revised March 1st, 2008 Reminder: The Prime Number Theorem Let π(x) denote the
More informationencoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256
General Models for Compression / Decompression -they apply to symbols data, text, and to image but not video 1. Simplest model (Lossless ( encoding without prediction) (server) Signal Encode Transmit (client)
More informationImage Compression. 1. Introduction. Greg Ames Dec 07, 2002
Image Compression Greg Ames Dec 07, 2002 Abstract Digital images require large amounts of memory to store and, when retrieved from the internet, can take a considerable amount of time to download. The
More informationCryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R)
Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R) Eli Biham Computer Science Department Technion Israel Institute of Technology Haifa 32000, Israel biham@cs.technion.ac.il http://www.cs.technion.ac.il/~biham/
More informationTopic 1: Digital Data
Term paper: Judging the feasibility of a topic Is it a topic you are excited about? Is there enough existing research in this area to conduct a scholarly study? Topic 1: Digital Data ECS 15, Winter 2015
More informationWhat is Binary? Digital Systems and Information Representation. An Example. Physical Representation. Boolean Algebra
What is Binary? Digital Systems and Information Representation CSE 102 Underlying base signals are two valued: 0 or 1 true or false (T or F) high or low (H or L) One bit is the smallest unambiguous unit
More informationBranch Prediction based attacks using Hardware performance Counters IIT Kharagpur
Branch Prediction based attacks using Hardware performance Counters IIT Kharagpur March 19, 2018 Modular Exponentiation Public key Cryptography March 19, 2018 Branch Prediction Attacks 2 / 54 Modular Exponentiation
More informationElliptic Curve Cryptography and Security of Embedded Devices
Elliptic Curve Cryptography and Security of Embedded Devices Ph.D. Defense Vincent Verneuil Institut de Mathématiques de Bordeaux Inside Secure June 13th, 2012 V. Verneuil - Elliptic Curve Cryptography
More informationInformation Theoretical Analysis of Digital Watermarking. Multimedia Security
Information Theoretical Analysis of Digital Watermaring Multimedia Security Definitions: X : the output of a source with alphabet X W : a message in a discrete alphabet W={1,2,,M} Assumption : X is a discrete
More informationImperfect Stegosystems
DISSERTATION DEFENSE Imperfect Stegosystems Asymptotic Laws and Near-Optimal Practical Constructions Tomá² Filler Dept. of Electrical and Computer Engineering SUNY Binghamton, New York April 1, 2011 2
More information2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms
CRYPTOGRAPHY 19 Cryptography 5 ElGamal cryptosystems and Discrete logarithms Definition Let G be a cyclic group of order n and let α be a generator of G For each A G there exists an uniue 0 a n 1 such
More informationMathematical Foundations of Public-Key Cryptography
Mathematical Foundations of Public-Key Cryptography Adam C. Champion and Dong Xuan CSE 4471: Information Security Material based on (Stallings, 2006) and (Paar and Pelzl, 2010) Outline Review: Basic Mathematical
More informationFinite Frame Quantization
Finite Frame Quantization Liam Fowl University of Maryland August 21, 2018 1 / 38 Overview 1 Motivation 2 Background 3 PCM 4 First order Σ quantization 5 Higher order Σ quantization 6 Alternative Dual
More informationNew wrinkle in dirty paper techniques
New wrinkle in dirty paper techniques Brett Bradley, John Stach Digimarc Corporation, 19801 SW 72 nd Ave, Suite 250, Tualatin, OR, USA 97062 ABSTRACT The many recent publications that focus upon watermarking
More informationMultimedia. Multimedia Data Compression (Lossless Compression Algorithms)
Course Code 005636 (Fall 2017) Multimedia Multimedia Data Compression (Lossless Compression Algorithms) Prof. S. M. Riazul Islam, Dept. of Computer Engineering, Sejong University, Korea E-mail: riaz@sejong.ac.kr
More informationRun-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE
General e Image Coder Structure Motion Video x(s 1,s 2,t) or x(s 1,s 2 ) Natural Image Sampling A form of data compression; usually lossless, but can be lossy Redundancy Removal Lossless compression: predictive
More information