0% Complete
صفحه اصلی
/
بیست و نهمین کنفرانس مهندسی برق ایران
Image steganography Based on Chaos permutation, authentication and wiener deconvolution
نویسندگان :
Ali Sheidaee
1
Mohammad Asadpour
2
Leili Farzinvash
3
1- دانشگاه تبریز
2- دانشگاه تبریز
3- دانشگاه تبریز
کلمات کلیدی :
Steganography, Chaos Permutation, Authentication, deconvolution, Discrete Cosine Transform (DCT)
چکیده :
Image steganography means hiding secret image into another meaningful image. Researchers have employed different algorithms such as wavelet transform, discrete cosine transform functions and etc. to transform secret image and different image processing algorithms like image encryption, utilized to reach better stego images in case of imperceptibility and robustness. In most of researches, higher robustness methods have lower impeccability and vice versa. In this paper, we propose an adaptive LSB method using chaos permutation, DCT and secret image authentication to increase both imperceptibility and robustness in application. Chaos permutation is a key feature in our work to improve the robustness of secret image against attacks and wiener filter deconvolution is employed to extract a clear secret image in receiver side, which has the lowest noise in comparison with the original secret image. The improvement of our proposed method have been analyzed and evaluated by different criteria such as PSNR, SSIM and Histogram plots.
لیست مقالات
لیست مقالات بایگانی شده
Accurate state of charge estimation for lithium-ion batteries for stationary energy storage applications using low-cost measureent sensors
Omeed Rezaee - Iman Sharifi - Mohammad Bagher Menhaj
Investigating the Effects of Adding Distributed Generation Resources to the Distribution Networks on their Protection System Performance
Morteza Abbasghorbani - Elham Vahed
Compact Multiband HMSIW Antenna Loaded with Complementary Split Ring Resonators
Rasol Zayer - Mohamamd Naghi Azarmanesh - Javad Nourinia - Changiz Ghobadi - Farzad Alizadeh - Bahman Mohammadi
Transmission and Energy Storage Co-Planning Expansion Considering Short-Term Uncertainties under Renewable Penetration
Mojtaba Moradi-Sepahvand - Turaj Amraee
Improved Generative Adversarial Network with Differentiable KS Distance
Siavash Sadeghi Ivrigh - Mohammadreza Hassannejad Bibalan - Asghar Keshtkar
External Force Control with Disturbance Rejection for 6 DoF Manipulator
Zahra Bonakdar - Arefe Hamidipour - Hamed Ghafarirad
A Robust Video Steganography using 3D-CNN and Maximum Mean Discrepancy Cost Function
Ali Ghofrani - Rahil Mahdian Toroghi - Hassan Zareian
A Novel Application of the Travel Profile for the Electrical Bus in Electric Systems for Transportation
Mohsen Tamaddon - Mohsen Davoodi
A Barrier Function Based Feedback Linearization Method for On-line Output Tracking Control of Non-minimum Phase Systems
Fatemeh Jahangiri - Ali Talebi - Mohammad Bagher Menhaj
Effective Rate Analysis of MISO Wireless Communication Systems over EGK Fading Channels
ّfereshteh Salimian Rizi - Abolfazl Falahati
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 40.3.1