Abstract
The method of embedding data into images, which are subject to subsequent JPEG-algorithm processing, has been suggested. The special features of embedding that determine secrecy and stability of confidential data have been considered.
On purpose to develop an efficient steganographic method a criterion has been synthesized that has been applied as the goal function for embedding. The procedure of hiding is hereby realized by means of solving the optimization problem.
The approach employed for stegomethod development adapts to the requirements of image processing by means of different algorithms and can therefore be widely practically used.
On purpose to develop an efficient steganographic method a criterion has been synthesized that has been applied as the goal function for embedding. The procedure of hiding is hereby realized by means of solving the optimization problem.
The approach employed for stegomethod development adapts to the requirements of image processing by means of different algorithms and can therefore be widely practically used.
Original language | English |
---|---|
Title of host publication | 42nd Annual 2008 IEEE International Carnahan Conference on Security Technology (ICCST 2008) |
Subtitle of host publication | October 13 - 16, 2008, Prague, Czech Republic |
Editors | Larry D. Sanson, Karel Fliegel |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 69-75 |
Number of pages | 7 |
ISBN (Print) | 9781424418176 |
DOIs | |
Publication status | Published - 2008 |
Externally published | Yes |
Keywords
- Steganography
- Pattern-based embedding
- Secrecy
- Robustness
- JPEG algorithm
- Wavelet-transform