Cover Selection Steganography Via Run Length Matrix and Human Visual System
Journal Title: Journal of Information Systems and Telecommunication - Year 2013, Vol 1, Issue 2
Abstract
A novel approach for steganography cover selection is proposed, based on image texture features and human visual system. Our proposed algorithm employs run length matrix to select a set of appropriate images from an image database and creates their stego version after embedding process. Then, it computes similarity between original images and their stego versions by using structural similarity as image quality metric to select, as the best cover, one image with maximum similarity with its stego. According to the results of comparing our new proposed cover selection algorithm with other steganography methods, it is confirmed that the proposed algorithm is able to increase the stego quality. We also evaluated the robustness of our algorithm over steganalysis methods such as Wavelet based and Block based steganalyses; the experimental results show that the proposed approach decreases the risk of message hiding detection.
Authors and Affiliations
Sara Nazari, Mohammad -Shahram Moin
A Semantic Approach to Person Profile Extraction from Farsi Web Documents
Entity profiling (EP) as an important task of Web mining and information extraction (IE) is the process of extracting entities in question and their related information from given text resources. From computational viewp...
Load Balanced Spanning Tree in Metro Ethernet Networks
Spanning Tree Protocol (STP) is a link management standard that provides loop free paths in Ethernet networks. Deploying STP in metro area networks is inadequate because it does not meet the requirements of these network...
Assessment of Performance Improvement in Hyperspectral Image Classification Based on Adaptive Expansion of Training Samples
High dimensional images in remote sensing applications allow us to analysis the surface of the earth with more details. A relevant problem for supervised classification of hyperspectral image is the limited availability...
Online Signature Verification: a Robust Approach for Persian Signatures
In this paper, the specific trait of Persian signatures is applied to signature verification. Efficient features, which can discriminate among Persian signatures, are investigated in this approach. Persian signatures, in...
A New Approach to the Quantitative Measurement of Software Reliability
Nowadays software systems have very important role in a lot of sensitive and critical applications. Sometimes a small error in software could cause financial or even health loss in critical applications. So reliability a...