261 research outputs found

    Universal Image Steganalytic Method

    Get PDF
    In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting well-known and also newly developed steganographic methods. The steganalytic model is trained by MHF-DZ steganographic algorithm previously designed by the same authors. The calibration technique with the Feature Based Steganalysis (FBS) was employed in order to identify statistical changes caused by embedding a secret data into original image. The steganalyzer concept utilizes Support Vector Machine (SVM) classification for training a model that is later used by the same steganalyzer in order to identify between a clean (cover) and steganographic image. The aim of the paper was to analyze the variety in accuracy of detection results (ACR) while detecting testing steganographic algorithms as F5, Outguess, Model Based Steganography without deblocking, JP Hide&Seek which represent the generally used steganographic tools. The comparison of four feature vectors with different lengths FBS (22), FBS (66) FBS(274) and FBS(285) shows promising results of proposed universal steganalytic method comparing to binary methods

    Human Visual System Models in Digital Image Watermarking

    Get PDF
    In this paper some Human Visual System (HVS) models used in digital image watermarking are presented. Four different HVS models, which exploit various properties of human eye, are described. Two of them operate in transform domain of Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). HVS model in DCT domain consists of Just Noticeable Difference thresholds for corresponding DCT basis functions corrected by luminance sensitivity and self- or neighborhood contrast masking. HVS model in DWT domain is based on different HVS sensitivity in various DWT subbands. The third presented HVS model is composed of contrast thresholds as a function of spatial frequency and eye's eccentricity. We present also a way of combining these three basic models to get better tradeoff between conflicting requirements of digital watermarks. The fourth HVS model is based on noise visibility in an image and is described by so called Noise Visibility Function (NVF). The possible ways of exploiting of the described HVS models in digital image watermarking are also briefly discussed

    Codebook Code Division Multiple Access Image Steganography

    Get PDF
    In this paper, a new modification of spread spectrum image steganography (SSIS) is presented. The proposed modification of SSIS hides and recovers a message of substantial length within digital image while maintaining the original image size and dynamic range. An embedded message can be in the form of text, image, or any other digital signal. Our method is based on CDMA SSIS technique. To increase the information capacity of the stego channel and decrease a distortion of a cover image, a new modification of CDMA using a codebook (in the following referred to as Codebook CDMA (CCDMA)) is suggested

    Using of Hand Geometry in Biometric Security Systems

    Get PDF
    In this paper, biometric security system for access control based on hand geometry is presented. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Experiments show that the physical dimensions of a human hand contain information that is capable to verify the identity of an individual. The database created for our system consists of 408 hand images from 24 people of young ages and different sex. Different pattern recognition techniques have been tested to be used for verification. Achieved experimental results FAR=0,1812% and FRR=14,583% show the possibilities of using this system in environment with medium security level with full acceptance from all users

    Digital Image Watermaking in Color Models Using DCT Transformation

    Get PDF
    In recent years, an access to multimedia data has become much easier due to the rapid growth of the Internet. While this is usually considered an improvement of everyday life, it also makes unauthorized copying and distributing of multimedia data much easier, therefore presenting a challenge in the field of copyright protection. Digital watermarking, which is inserting copyright information into the data, has been proposed to solve the problem. In this paper two original watermarking schemes based on DCT transformation for ownership verification and authentication of color images were proposed. Some color models in process of watermarks embedding and extracting are described too

    Implementations of HVS Models in Digital Image Watermarking

    Get PDF
    In the paper two possible implementations of Human Visual System (HVS) models in digital watermarking of still images are presented. The first method performs watermark embedding in transform domain of Discrete Cosine Transform (DCT) and the second method is based on Discrete Wavelet Transform (DWT). Both methods use HVS models to select perceptually significant transform coefficients and at the same time to determine the bounds of modification of selected coefficients in watermark embedding process. The HVS models in DCT and DWT domains consist of three parts which exploit various properties of human eye. The first part is the HVS model in DCT (DWT) domain based on three basic properties of human vision: frequency sensitivity, luminance sensitivity and masking effects. The second part is the HVS model based on Region of Interest (ROI). It is composed of contrast thresholds as a function of spatial frequency and eye\'s eccentricity. The third part is the HVS model based on noise visibility in an image and is described by so called Noise Visibility Function (NVF). Watermark detection is performed without use of original image and watermarks have a form of real number sequences with normal distribution zero mean and unit variance. The robustness of presented perceptual watermarking methods against various types of attacks is also briefly discussed

    Digital Watermarking in Wavelet Transform Domain

    Get PDF
    This paper presents a technique for the digital watermarking of still images based on the wavelet transform. The watermark (binary image) is embedded into original image in its wavelet domain. The original unmarked image is required for watermark extraction. The method of embedding of digital watermarks in wavelet transform domain was analyzed and verified on grey scale static images

    A competitive hybridization model predicts probe signal intensity on high density DNA microarrays

    Get PDF
    A central, unresolved problem of DNA microarray technology is the interpretation of different signal intensities from multiple probes targeting the same transcript. We propose a competitive hybridization model for DNA microarray hybridization. Our model uses a probe-specific dissociation constant that is computed with current nearest neighbor model and existing parameters, and only four global parameters that are fitted to Affymetrix Latin Square data. This model can successfully predict signal intensities of individual probes, therefore makes it possible to quantify the absolute concentration of targets. Our results offer critical insights into the design and data interpretation of DNA microarrays

    Sensitivity, Specificity and the Hybridization Isotherms of DNA Chips

    Full text link
    Competitve hybridization, at the surface and in the bulk, lowers the sensitivity of DNA chips. Competitive surface hybridization occurs when different targets can hybridize with the same probe. Competitive bulk hybridization takes place when the targets can hybridize with free complementary chains in the solution. The effects of competitive hybridization on the thermodynamically attainable performance of DNA chips are quantified in terms of the hybridization isotherms of the spots. These relate the equilibrium degree of the hybridization to the bulk composition. The hybridization isotherm emerges as a Langmuir isotherm modified for electrostatic interactions within the probe layer. The sensitivity of the assay in equilibrium is directly related to the slope of the isotherm. A simpler description is possible in terms of c50c_{50}s specifying the bulk composition corresponding to 50% hybridization at the surface. The effects of competitive hybridization are important for the quantitative analysis of DNA chip results especially when used to study point mutations.Comment: 18 pages and 7 figures. To be published in Biophys.
    corecore