PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Development and research of additional parameters of steganographic systems

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper contains research on and methods of determining values for basic parameters of steganographic systems. In particular, a parameter of concealing the presence of information in a digital environment is researched. Using this particular parameter increases the degree of protection of a message introduced into a digital environment. This parameter is one of the fundamental ones in case of implementation of a steganalysis system. Besides that, this paper contains a review of parameters of redundancy of a digital environment and the parameter of steganogram resistance to technological transformations in digital environments.
Rocznik
Strony
161--170
Opis fizyczny
Bibliogr. 14 poz.
Twórcy
  • Technical Institute in Kraków
Bibliografia
  • 1. Afanasyeva, O.Y. (2006) Parameter of invisibility in steganosystems. Science and techniDE conference of young scientists and engineers of modeling. Kyiv, Institute of modeling problems in energetiDE of NAS of Ukraine.
  • 2. Afanasyeva, O.Y. (2009) Analysis of parameters of steganosystems oriented towards using graphical digital environments. Modeling and information technologies: collected articles (IMPE of NAS of Ukraine). Kyiv, Issue 50.
  • 3. Babash, A.V. & Shankin, G.P. (2002) The history of cryptography. Moscow: SOLON-R.
  • 4. Doubechies, I. (1990) The wavelet transform, time-frequency localization and signal analysis. IEEE Transactions on Information Theory 36, pp. 961–1005.
  • 5. Katok, A. & Hasselblat, B. (1999) Introduction to the modern theory of dynamical systems. Moscow: Factorial.
  • 6. Katzenbeisser, S. & Petitcolas, F.A.P. (Eds) (2000) Information hiding techniques for steganography and digital watermarking. Boston – London: Artech House.
  • 7. Kharin, Y.S., Bernik, V.I. & Matveev, G.V. (1999) Mathematical basiDE of cryptology. Minsk: BSU.
  • 8. Noda, H., Niimi, M. & Kawaguchi, E. (2006) High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters 27(5), pp. 455–461.
  • 9. Popov, S.N. (2000) PC video system. St. Petersburg: BHV-Peterburg, Arlit.
  • 10. Provos, N. & Honeyman, P. (2002) Detecting Steganographic Content on the Internet. Proc. 2002 Network and Distributed System Security Symp., Internet Soc.
  • 11. Provos, N. & Honeyman, P. (2003) Hide and Seek: An introduction to steganography. University of Michigan. IEEE Security & Privacy.
  • 12. Sayood, H. (2002) Kompresja danych. Wprowadzenie. Warszawa: RM.
  • 13. Vatolin, D., Ratushnyak, A., Smirnov, M. & Yukin, V. (2002) Methods of data compression. Structure of archivers, image and video compression. Moscow: DIALOG-MIFI.
  • 14. Yhang, T. & Ping, X. (2003) A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms. Pric. 8th ACM Sym. Applied Computing, ACM.
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę (zadania 2017)
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-032d1d5f-7814-45c6-a636-cf80f1731276
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.