Surmounting the Effects of Lossy Compression on Steganography
Currie, Daniel L.
Irvine, Cynthia E.
MetadataShow full item record
Steganographic techniques can be used to hide data within digital images with little or no visible change in the perceived appearance of the image and can be exploited to export sensitive information. Since images are frequently compressed for storage or transmission, effective steganography must employ coding techniques to counter the errors caused by lossy compression algorithms. The Joint Photographic Expert Group (JPEG) compression algorithm, while producing only a small amount of visual distortion, introduces a relatively large number of errors in the bitmap data. It is shown that, despite errors caused by compression, information can be steganographically encoded into pixel data so that it is recoverable after JPEG processing, though not with perfect accuracy.
Showing items related by title, author, creator and subject.
Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes Currie, Daniel L.; Campbell, Hannelore (Monterey, California. Naval Postgraduate School, 1996-03);The term steganography is descriptive of techniques used to covertly communicate by embedding a secret message within an overt message. Such techniques can be used to hide data within digital images with little or no visible ...
Effects of the wireless channel, signal compression and network architecture on speech quality in VOIP networks Nikolaos, Tiantioukas (Monterey California. Naval Postgraduate School, 2007-06);Voice over Internet Protocol (VoIP) telephony is an emerging technology slowly finding its way into military applications. It provides several advantages over PSTN but comes short on performance, quality of service and ...
Walker, Thaddeus Owens (Monterey, California. Naval Postgraduate School, 1995-06);The advances in high speed computer networks and digital communication techniques have enabled the rapid and extensive dissemination of information throughout the modern defense infrastructure. One of the challenges in ...