مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

4,961
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

REVIEW OF JPEG STEGANOGRAPHY METHODS AND THEIR SECURITY ANALYSIS

Pages

  75-98

Abstract

 JPEG is the most applicable image format in digital communication. In recent years, various steganography methods have been proposed for it. This paper aims to study and classify JPEG steganography schemes and introduce different methods to improve their SECURITY based on cover. Accordingly, the effective factors in SECURITY that are related to the cover such as double compression, spatial frequencies and quality factor have been evaluated theoretically and experimentally. Also some well-known steganography algorithms and software tools have been introduced, evaluated and classified based on different criteria. Some of these algorithms have been implemented in Stegotest software and the destruction effects of steganography in different methods have been compared.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    JAMALI DINAN, FATEMEH SADAT, REZAEE, MOHAMMAD, BEIGZADEH, MARYAM, & BAYAT, ELAHE. (2009). REVIEW OF JPEG STEGANOGRAPHY METHODS AND THEIR SECURITY ANALYSIS. SIGNAL AND DATA PROCESSING, -(2 (SERIAL 12)), 75-98. SID. https://sid.ir/paper/160809/en

    Vancouver: Copy

    JAMALI DINAN FATEMEH SADAT, REZAEE MOHAMMAD, BEIGZADEH MARYAM, BAYAT ELAHE. REVIEW OF JPEG STEGANOGRAPHY METHODS AND THEIR SECURITY ANALYSIS. SIGNAL AND DATA PROCESSING[Internet]. 2009;-(2 (SERIAL 12)):75-98. Available from: https://sid.ir/paper/160809/en

    IEEE: Copy

    FATEMEH SADAT JAMALI DINAN, MOHAMMAD REZAEE, MARYAM BEIGZADEH, and ELAHE BAYAT, “REVIEW OF JPEG STEGANOGRAPHY METHODS AND THEIR SECURITY ANALYSIS,” SIGNAL AND DATA PROCESSING, vol. -, no. 2 (SERIAL 12), pp. 75–98, 2009, [Online]. Available: https://sid.ir/paper/160809/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top