0% Complete
صفحه اصلی
/
بیست و نهمین کنفرانس مهندسی برق ایران
Image steganography Based on Chaos permutation, authentication and wiener deconvolution
نویسندگان :
Ali Sheidaee
1
Mohammad Asadpour
2
Leili Farzinvash
3
1- دانشگاه تبریز
2- دانشگاه تبریز
3- دانشگاه تبریز
کلمات کلیدی :
Steganography, Chaos Permutation, Authentication, deconvolution, Discrete Cosine Transform (DCT)
چکیده :
Image steganography means hiding secret image into another meaningful image. Researchers have employed different algorithms such as wavelet transform, discrete cosine transform functions and etc. to transform secret image and different image processing algorithms like image encryption, utilized to reach better stego images in case of imperceptibility and robustness. In most of researches, higher robustness methods have lower impeccability and vice versa. In this paper, we propose an adaptive LSB method using chaos permutation, DCT and secret image authentication to increase both imperceptibility and robustness in application. Chaos permutation is a key feature in our work to improve the robustness of secret image against attacks and wiener filter deconvolution is employed to extract a clear secret image in receiver side, which has the lowest noise in comparison with the original secret image. The improvement of our proposed method have been analyzed and evaluated by different criteria such as PSNR, SSIM and Histogram plots.
لیست مقالات
لیست مقالات بایگانی شده
Formation Control of Aircrafts using fuzzy Longitudinal Control with NSGA-II Optimization Method
Saba Nikseresht - Saeed Khankalantary
حسگر ضریب شکست مبتنی بر فانو رزونانس در موجبرهای فلز- عایق- فلز، با رزوناتور صفحهای تزویج شده از جانب
تورج هاشمی - نسرین عبدالهی برازجان - عباس علی قنبری
Generalized Robust Control Approach for an Aerial Robot in Grasping Oscillatory Objects
Mirshams Baha - Fariborz Saghafi
Forged Channel: A Breakthrough Approach for Accurate Parkinson's Disease Classification using Leave-One-Subject-Out Cross-Validation
SeyedAmirReza Hamidi - Kamal Mohamed-Pour - Mohammad Yousefi
T-type L-2L De-Embedding Method for On-Wafer T-model Transmission Line Network
Milad Seyedi - Nasser Masoumi - Samad Sheikhaei
Design of a High-Efficiency RF Energy Harvesting System
Saeed Abbasi FallahPour - Shokrollah Karimian - ٍEsfandiar Mehrshahi
Outage and Sum-Rate Analysis for mCAP-NOMA in Visible Light Communication Under Users' Mobility
Amir Oshtoudan - Seyed Mohammad Sajad Sadough
Enhancing Brain Tumor Classification in OCT Images using Local Phase Quantization Features
Naeem Eslamyeh Hamedani - Hasti Shabani
Empirical Performance Analysis and Channel Modeling of UAV-Assisted LoRa Networks
Hossein Aghajari - Sajad Ahmadinabi - Hamed Bakhtiari babadegani - Mehdi Naderi soorki
Second-Order Sliding Mode Design Based on the Integration of Proportional-Integral and Nonlinear $\mathcal{H}_\infty$ Controllers for Load Frequency Control
Behrad Samari - Mohammad Javad Yazdanpanah
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.8.0