Master's Thesis from the year 2009 in the subject Computer Science - IT-Security, grade: 19.61 / 20, , language: English, abstract: Cryptography is a technology intended to protect digital data being transmitted over communication systems. It provides mathematical methods for converting data into an unreadable form. Steganography is a technique by which the secret digital data is sent from side to side by hiding it in an innocent-looking digital cover, so the existence of hidden data is concealed. Combining Cryptography and Steganography provides two-layers protection. The first layer encrypts the secret message, so it becomes unreadable. While the second layer hides the encrypted message into an ordinary non-secret digital cover, so it can not be seen. In this thesis, we briefly review the principles of cryptography and its algorithms, while we accomplish a detailed study in the field of JPEG-based steganography since JPEG format is the most used through the internet.In Chapter 4, we perform a comparative study between DCT-based steganographic methods F3, F5, and Mod4 using 60 JPEG images. In this study, three steganographic requirements are considered; embedding capacity, stego image quality, and statistical properties. The study compares the considered methods from the standpoint of the Magic Triangle. It inspects how each of the studied methods satisfies the three basic requirements, and then it determines an approximate location for each algorithm inside the Magic Triangle. The study shows how each of the studied algorithms stands compared to the other ones.In Chapter 5, we discuss the shrinkage phenomenon occurring during the F5 embedding process and present all the effects of shrinkage caused by the F5 process. To reduce the shrinkage rate, we propose a new F5 model based on the original method. The new F5 model controls the shrinkage rate by building a Map Of Shrinkage (MOS). The MOS map helps to keep the shrinkage at a lower probability of occurrence.
Master's Thesis from the year 2009 in the subject Computer Science - IT-Security, grade: 19.61 / 20, , language: English, abstract: Cryptography is a technology intended to protect digital data being transmitted over communication systems. It provides mathematical methods for converting data into an unreadable form. Steganography is a technique by which the secret digital data is sent from side to side by hiding it in an innocent-looking digital cover, so the existence of hidden data is concealed. Combining Cryptography and Steganography provides two-layers protection. The first layer encrypts the secret message, so it becomes unreadable. While the second layer hides the encrypted message into an ordinary non-secret digital cover, so it can not be seen. In this thesis, we briefly review the principles of cryptography and its algorithms, while we accomplish a detailed study in the field of JPEG-based steganography since JPEG format is the most used through the internet.In Chapter 4, we perform a comparative study between DCT-based steganographic methods F3, F5, and Mod4 using 60 JPEG images. In this study, three steganographic requirements are considered; embedding capacity, stego image quality, and statistical properties. The study compares the considered methods from the standpoint of the Magic Triangle. It inspects how each of the studied methods satisfies the three basic requirements, and then it determines an approximate location for each algorithm inside the Magic Triangle. The study shows how each of the studied algorithms stands compared to the other ones.In Chapter 5, we discuss the shrinkage phenomenon occurring during the F5 embedding process and present all the effects of shrinkage caused by the F5 process. To reduce the shrinkage rate, we propose a new F5 model based on the original method. The new F5 model controls the shrinkage rate by building a Map Of Shrinkage (MOS). The MOS map helps to keep the shrinkage at a lower probability of occurrence.
In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals,...
This new edition aims to provide students, researchers, and professionals with technical information regarding digital watermarking and steganography. Steganographic messages are often first...
Discover your next great read at BookLoop, Australiand online bookstore offering a vast selection of titles across various genres and interests. Whether you're curious about what's trending or searching for graphic novels that captivate, thrilling crime and mystery fiction, or exhilarating action and adventure stories, our curated collections have something for every reader. Delve into imaginative fantasy worlds or explore the realms of science fiction that challenge the boundaries of reality. Fans of contemporary narratives will find compelling stories in our contemporary fiction section. Embark on epic journeys with our fantasy and science fiction titles,
Shop Trending Books and New Releases
Explore our new releases for the most recent additions in romance books, fantasy books, graphic novels, crime and mystery books, science fiction books as well as biographies, cookbooks, self help books, tarot cards, fortunetelling and much more. With titles covering current trends, booktok and bookstagram recommendations, and emerging authors, BookLoop remains your go-to local australian bookstore for buying books online across all book genres.
Shop Best Books By Collection
Stay updated with the literary world by browsing our trending books, featuring the latest bestsellers and critically acclaimed works. Explore titles from popular brands like Minecraft, Pokemon, Star Wars, Bluey, Lonely Planet, ABIA award winners, Peppa Pig, and our specialised collection of ADHD books. At BookLoop, we are committed to providing a diverse and enriching reading experience for all.
Sign In
your cart
Your cart is empty
Menu
Search
PRE-SALES
If you have any questions before making a purchase chat with our online operators to get more information.