پديد آورنده :
ثابتي، وجيهه
عنوان :
پنهان شناسي روش هاي تطبيقي در حوزه مكان Stegology of Adaptive Methods in Spatial Domain
گرايش تحصيلي :
مهندسي كامپيوتر
محل تحصيل :
اصفهان: دانشگاه صنعتي اصفهان، دانشكده برق و كامپيوتر
صفحه شمار :
سيزده،186ص.: مصور،جدول،نمودار
يادداشت :
ص.ع.به فارسي انگليسي
استاد راهنما :
شادرخ سماوي
استاد مشاور :
محمدرضا احمدزاده
توصيفگر ها :
پنهان شكني , پيچيدگي
تاريخ نمايه سازي :
3/8/91
استاد داور :
كريم فائز، محمدرضا يزدچي، محمود مدرس هاشمي
دانشكده :
مهندسي برق و كامپيوتر
كد ايرانداك :
ID470 دكتري
چكيده فارسي :
به فارسي و انگليسي: قابل رويت در نسخه ديجيتالي
چكيده انگليسي :
Stegology of Adaptive Methods in Spatial Domain Vajiheh Sabeti vajiheh sabeti@gmail com Tuesday July 10 2012 Department of Electrical and Computer EngineeringIsfahan University of Technology Isfahan 84156 83111 IranProf Shadrokh Samavi1Assist Prof Mohammad Reza Ahmadzadeh Assist Prof Amir BorjiAbstract Steganography methods that embed data based on human vision system HVS characteristics are called adaptive methods Based on HVS characteristics edge regionsare more suitable for embedding The main goal of this dissertation is to studysteganography and steganalysis or in short stegology of adaptive methods Therefore inthe first step we analyzed existing adaptive embedding methods and proposed a generalstructure for them We introduced a number of parameters that are detrimental in adaptivemethods security Thereafter we proposed a model for evaluating security level of anadaptive method Most of adaptive methods use LSB Flipping method as means of data embedding In the second step we unveiled weaknesses of this adaptive method and proposed analgorithm to defeat an LSB F based adaptive method In these attacks we were able toestimate the amount of payload in a stego image To ensure the accuracy of our presented stegologicalassumptions a new adaptive method is presented The proposed method uses a localneighborhood analysis for determination of secure locations to use LSB Matching for theembedding purpose Experiments showed the superiority of our algorithm over wellknown adaptive methods and LSB Matching based methods Key WordsSteganograghy Steganalysis Stegology Steganology Adaptive methods Complexity1 Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan Iran
استاد راهنما :
شادرخ سماوي
استاد مشاور :
محمدرضا احمدزاده
استاد داور :
كريم فائز، محمدرضا يزدچي، محمود مدرس هاشمي