Cryptography and Steganography in Digital Images / Najlacnejšie knihy
Cryptography and Steganography in Digital Images

Code: 18791495

Cryptography and Steganography in Digital Images

by Wassim Al Chamaa

Master's Thesis from the year 2009 in the subject Computer Science - IT-Security, grade: 19.61 / 20, , language: English, abstract: Cryptography is one of the technological means that provides protection to digital data being tran ... more

73.86

RRP: 79.42 €

You save 5.56 €


In stock at our supplier
Shipping in 15 - 20 days
Add to wishlist

You might also like

Give this book as a present today
  1. Order book and choose Gift Order.
  2. We will send you book gift voucher at once. You can give it out to anyone.
  3. Book will be send to donee, nothing more to care about.

Book gift voucher sampleRead more

More about Cryptography and Steganography in Digital Images

You get 186 loyalty points

Book synopsis

Master's Thesis from the year 2009 in the subject Computer Science - IT-Security, grade: 19.61 / 20, , language: English, abstract: Cryptography is one of the technological means that provides protection to digital data being transmitted on communications systems. It provides methods of converting data into an unreadable form, while the Steganography is a technique by which the secret digital data is sent from one place to other by hiding it within a digital cover so the existence of secret data is concealed. The data to be hidden takes the form of any bit stream while the digital cover can be a digital image, audio, or video file. Combining Cryptography and Steganography provides two layers protection, the former encrypts the secret message so it becomes unreadable; the latter hides the encrypted message into a digital cover so it cannot be seen. In this thesis, we do a general tour of cryptography concepts and algorithms but we do a deep work on Steganography using JPEG images. Since JPEG format is the most frequently used through the internet, it is desirable to study some Steganographic techniques based on JPEG format. Chapter 2 presents the JPEG structure and the related subjects; DCT transformation, and entropy coding. Chapter 3 presents some important DCT-based methods like F3, F5, and Mod4 and shows their properties and features. Chapter 4 presents a comparison study between DCT-based steganographic methods F5 and Mod4, the study was completed using Matlab software written for F5 and Mod4 algorithms. In this study, three steganographic requirements are considered; insertion capacity, image quality, and statistical properties. The study shows that F5_111 has big insertion capacity but it could be detected easily while Mod4 has small insertion capacity but it can not be detected easily. The study shows that F5_ME takes a middle position between the considered algorithms. A magic triangle model is illustrated in order to compare visually between the considered algorithms. Chapter 5 shows the shrinkage phenomenon occurring during the embedding process of F5; it presents all the effects of shrinkage in the F5 algorithm. In order to reduce the shrinkage rate, a new method F5_MOS is proposed, F5_MOS controls the shrinkage rate by building a Map Of Shrinkage. A comparison study is done between the F5_MOS and the traditional F5_ME considering the main steganographic requirements. The comparison shows how F5_MOS provides more insertion capacity and how it makes the hidden message more undetectable.

Book details

Book category Books in English Computing & information technology Computer networking & communications

73.86

Trending among others



Collection points Bratislava a 2642 dalších

Copyright ©2008-24 najlacnejsie-knihy.sk All rights reservedPrivacyCookies


Account: Log in
Všetky knihy sveta na jednom mieste. Navyše za skvelé ceny.

Shopping cart ( Empty )

For free shipping
shop for 59,99 € and more

You are here: