This project presents a novel approach to image steganography titled "Random Pixel embedding: A Novel Approach to Image Steganography." Steganography, the art of concealing information within an innocuous ca...
详细信息
ISBN:
(纸本)9798350395334;9798350395327
This project presents a novel approach to image steganography titled "Random Pixel embedding: A Novel Approach to Image Steganography." Steganography, the art of concealing information within an innocuous carrier, finds widespread applications in secure communication and data protection. Our method employs a combination of LSB (Least Significant Bit) steganography, random pixel selection and AES (Advanced Encryption Standard) encryption to embed secret messages into digital images securely. The Tkinter library was used to create the system's user-friendly graphical user interface, which makes encoding and decoding processes easier. Additionally, it enhances the security of message encryption by incorporating PBKDF2 (Password-Based Key Derivation Function 2) for deriving cryptographic keys. By using this method, the project hopes to advance the fields of secure communication and data security by providing a reliable and effective way to conceal important information from view. The experimental results show that the suggested algorithm is reliable and effective, underscoring its potential for practical uses in data security and secure communication channels.
Network virtualization is an important technique to allow multiple customized networks to cohabit on a shared substrate network. In order to put the network virtualization into practice, the virtual network embedding ...
详细信息
ISBN:
(纸本)9781479928255;9781479928279
Network virtualization is an important technique to allow multiple customized networks to cohabit on a shared substrate network. In order to put the network virtualization into practice, the virtual network embedding (VNE) problem that searching an efficient mapping of a virtual network request onto substrate network resources should be solved primarily. Since the VNE problem is known to be NP-hard, previous work focused on designing heuristic-based algorithms. In this paper, we proposed the nodes clustering and dynamic service balance awareness based virtual network embedding (NC-DSBA) that employs the divide-and-conquer strategy along with the concurrence policy. Besides, the proposed NC-DSBA introduced a dynamic service balance algorithm to assist the embedding and improve the efficiency. The simulation results show that the NC-DSBA reduces the computational complexity, increases the acceptance ratio and revenue-cost ratio, and balances the loads of virtual nodes and links in substrate network in the long run.
To measure the survivability of virtual optical network embedding, a novel metric named virtual optical network failure probability (VON-FP) is presented in elastic optical networks. We then develop a failure-probabil...
详细信息
ISBN:
(纸本)9781479972197
To measure the survivability of virtual optical network embedding, a novel metric named virtual optical network failure probability (VON-FP) is presented in elastic optical networks. We then develop a failure-probability-aware virtual optical network embedding (FPA-VONE) algorithm considering different line rates to decrease VON-FP of each VON. Simulation results show that FPA-VONE provides lower average VON-FP than the baseline algorithm, as well as frequency slots (FS) usage.
One of the main challenges of network virtualization is efficient mapping of virtual nodes and virtual links onto the substrate network resources, which is known as virtual network embedding (VNE) problem. This paper ...
详细信息
ISBN:
(纸本)9781467385374
One of the main challenges of network virtualization is efficient mapping of virtual nodes and virtual links onto the substrate network resources, which is known as virtual network embedding (VNE) problem. This paper aims to increase the revenue and utilization of infrastructure provider as well as achieve efficiency mapping. Due to the NP-hard character of VNE, we model the VNE problem as an integer linear programming problem and adopt a DPSO-based heuristic algorithm to solve the problem, the operations and parameters of the particles are well redefined according to the VN embedding context. Considers the mapping complexity, an incentive convergence mechanism is proposed before embeddinxg a virtual network onto the substrate network. In this mechanism we use individual candidate physical nodes and reusable mapping technology to accelerate convergence and save more bandwidth during virtual network mapping. Simulation results show that the proposed algorithm is superior to existing similar algorithms in the physical network resource utilization, revenue/cost ratio and searching efficiency.
The piracy of digital products has become an urgent problem to be solved. Robust watermarking is a promising technique for copyright protection. To go against rapidly increasing attacks, many techniques have been prop...
详细信息
The piracy of digital products has become an urgent problem to be solved. Robust watermarking is a promising technique for copyright protection. To go against rapidly increasing attacks, many techniques have been proposed in the transform domain for ensuring the quality of water marked image, the robustness of extracted watermark, and execution time. Among these techniques, the LU decomposition is considered an out- standing transformation in terms of computation. However, some pixel matrices cannot be decomposed as the product of a lower triangular matrix and an upper triangular matrix, and embedding them into two elements reduces the quality of the watermark image. Therefore, this paper proposes a novel image watermarking scheme based on a LU block selection strategy and an improved embedding algorithm. First, a pixel block is only applied LU decomposition and embedded a watermark bit when all determinants of sub-matrices are non-zero. Second, an effective embedding formula is proposed where the watermark is embedded into one element of suitable blocks. This solution helps to limit the modification of pixel values and enhance the quality of the watermarked image. Third, to decrease the extraction time, a novel formula is built for calculating embedded elements instead of LU decomposition. The experimental results show that our proposed method has the better visual quality of watermarked images and can effectively extract the watermark under some attacks, such as blurring, sharpening, and salt & pepper noise.
Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the tradeoff between managing high capacity of secret data and ensuring hig...
详细信息
Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the tradeoff between managing high capacity of secret data and ensuring high security and quality of stego image is a major challenge. In this paper, a hybrid steganography method based on Haar Discrete Wavelet Transform, Lempel Ziv Welch algorithm, Genetic algorithm, and the Optimal Pixel Adjustment Process is proposed to improve the quality of the stego image and increase the capacity for secret data. The cover image is divided into non-overlapping blocks of n x n pixels. Then, the Haar Discrete Wavelet Transform is used to increase the robustness of the stego image against attacks. In order to increase the capacity for, and security of, the hidden image, the Lempel Ziv Welch algorithm is applied on the secret message. After that, the Genetic algorithm is employed to give the encoded and compressed secret message cover image coefficients. The Genetic algorithm is used to find the optimal mapping function for each block in the image. Lastly, the Optimal Pixel Adjustment Process is applied to reduce the error, i.e., the difference between the cover image blocks and the stego image blocks. This step is a further improvement to the stego image quality. The proposed method was evaluated using four standard images as covers and three types of secret messages. The results demonstrate higher visual quality of the stego image with a large size of embedded secret data than what is generated by already-known techniques. The experimental results show that the information-hiding capacity of the proposed method reached to 50% with high PSNR (52.83 dB). Thus, the herein proposed hybrid image steganography method improves the quality of the stego image over those of the state-of-the-art methods.
Digital watermarking technology is that directly embedded a number of landmark information into the multimedia content through a certain algorithm, which does not affect the value and use of original content, and can ...
详细信息
ISBN:
(纸本)9783642293894
Digital watermarking technology is that directly embedded a number of landmark information into the multimedia content through a certain algorithm, which does not affect the value and use of original content, and can not be aware of the perception system or note. MPEG-4 of the video structure is analyzed in the paper, we propose a spread spectrum-based video digital watermarking to improve the program, and gives application examples.
Steganography is the art and science of writing hidden messages in such a way that, apart from the sender and intended recipient, no one suspects the existence of the message, a form of security through the state of b...
详细信息
ISBN:
(纸本)9781479934485
Steganography is the art and science of writing hidden messages in such a way that, apart from the sender and intended recipient, no one suspects the existence of the message, a form of security through the state of being unknown. The main two famous schemes used for image steganography are spatial domain embedding and transform domain embedding. The main aim of DWT is used to transform original image (cover image) from spatial domain to frequency domain. But here in our proposed work, 2-D DWT is performed on a gray level cover image and Huffman encoding is performed on the secret messages before embedding.. The main purpose of the proposed work is to focus on improving embedding capacity and bring down the distortion occurring to the stego image. The refinement of the algorithm plays an important role for accomplishing higher embedding capacity and low distortion rate. The experimental results prove that the assessment metric such as PSNR is improved in a high manner. The experimental results show that the algorithm has a high capacity and a good invisibility.
To measure the survivability of virtual optical network embedding,a novel metric named virtual optical network failure probability(VON-FP)is presented in elastic optical *** then develop a failure-probabilityaware vir...
详细信息
To measure the survivability of virtual optical network embedding,a novel metric named virtual optical network failure probability(VON-FP)is presented in elastic optical *** then develop a failure-probabilityaware virtual optical network embedding(FPA-VONE)algorithm considering different line rates to decrease VON-FP of each *** results show that FPA-VONE provides lower average VON-FP than the baseline algorithm,as well as frequency slots(FS)usage.
暂无评论