29 research outputs found
A Brief Review of RIDH
The Reversible image data hiding (RIDH) is one of the novel approaches in the security field. In the highly sensitive domains like Medical, Military, Research labs, it is important to recover the cover image successfully, Hence, without applying the normal steganography, we can use RIDH to get the better result. Reversible data hiding has a advantage over image data hiding that it can give you double security surely
Best Fit Method of Sample Selection in Data Hiding and Extraction
Today data security and its transmission over the wireless network need special attention. Intruder always has a watch on sensitive data transmitted over a wireless network. This work proposes an approach that minimizes the quantization error between the original and result carrier by selecting optimize samples during Data Hiding. Propose work find out best matching carrier components during the data hiding process. Results also imply that achieved results are far better than any other steganographic method
New Framework for Code-Mapping-based Reversible Data Hiding in JPEG Images
Code mapping (CM) is an efficient technique of reversible data hiding (RDH)
in JPEG images, which embeds data by constructing the mapping relationship
between used codes and unused codes in JPEG bitstream. In this paper, we
present a new framework to design the CM-based RDH method. Firstly, to suppress
the file size expansion and improve the applicability, a new code mapping
strategy is proposed. Based on the proposed strategy, the mapped codes are
redefined by customizing a new Huffman table thoroughly rather than selected
from the unused codes in the original Huffman table. Afterwards, the key issue
of designing the CM-based RDH method, i.e., constructing the code mapping, is
converted into solving a combinatorial optimization problem. As a realization,
a novel CM-based RDH method is introduced by employing the genetic algorithm
(GA). Experimental results show that the efficacy of the proposed method with
high embedding capacity and no signal distortion while suppressing file size
expansion
Cyber Security
This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification