scholarly journals A Compression Resistant Steganography Based on Differential Manchester Code

Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 165
Author(s):  
Shuai Wang ◽  
Ning Zheng ◽  
Ming Xu

In the field of image steganography research, more and more attention is paid to the importance of stego image robustness. In order to make steganography accessible from laboratory to practical applications, it becomes critical that the stego images can resist JPEG compression from transmission channel. In this paper, an image steganography algorithm with strong robustness to resist JPEG compression is proposed. First, the robust cover elements are selected using the sign of DCT coefficients which are kept constant before and after JPEG compression. Additionally, a distortion function and a weighted cost adjustment method are designed to assign an appropriate cost to each candidate DCT coefficient. Finally, the message is embedded in the cover image which has minimal embedding distortion by flipping the signs of DCT coefficients, while differential Manchester code is applied to the element positions to obtain the location feature. Compared with the prior art, our algorithm has better undetectability and stronger robustness, and it can resist the attacks from the social network platforms such as Facebook, Twitter, and WeChat.

2020 ◽  
Vol 19 (4) ◽  
pp. 0078
Author(s):  
حنان طاهر حسن أ.د إنتصار عويد علي

The study seeks to prepare an educational curriculum by employing the mixing strategies of mental and knowledge maps and learning about its effect on learning the performance of the skill of overwhelming hitting with volleyball and its accuracy among fifth-graders students. The two researchers assumptions the experimental approach by designing the experimental groups and controlling (51) students who were deliberately selected at a rate of (55.914%) from Al-Mustansiriya prep in Salah Uddin Governorate for the academic year (2019-2020). The approved scores were the skill performance tests for the overwhelming multiplication skill and accuracy after being photographed before and after and evaluated, as they applied the learners in the experimental group by (4) educational units according to the weekly lessons schedule, they were devoted(3) groups for learning the performance and (1) to learn the accuracy as it was employed The concepts of mixing the two strategies in (2 x 3) flexes are presented with the application of educational exercises to activate the role of learners in the lesson and according to the specifics and steps mentioned. After completing the experiment according to the mentioned experimental design determinants, the researcher has verified the results with the Social Statistical Bag System (SPSS-V26) To be the first You will conclude and applications that the application of mixing strategies of mental and cognitive maps helps in improving the learning of the performance of the overwhelming beating skill of the plane and its accuracy among the fifth preparatory students, and excels at improving learning of its performance and accuracy among students who are educated in the methods used in the lesson of physical education, and attention must be taken to adopting practical applications to mix the teaching strategies That is concerned with the cognitive structure and further strengthening the link between the performance experiences of the skill of overwhelming and accurate information in the main section of the physical education lesson, and it is necessary to pay attention to the availability of differentiated flex C mental and cognitive mapping strategies in volleyball halls in middle schools.


Author(s):  
Rasber Dh. Rashid ◽  
Ladeh S. Abdulrahman ◽  
Taban F. Majeed

Digital Steganography means hiding sensitive data inside a cover object ina way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustness against attacks. In some cases, weneed to take in account not just the invisibility but also we need to thinkabout other requirement which is the robustness of recovering the embedded secrete messages. In this paper we propose a new steganoraphicscheme that aims to achieve the robustness even the stego image attackedby steganalyzers. Furthermore, we proposed a scheme which is more robust against JPEG compression attack compared with other traditionalsteganography schemes.


Author(s):  
Q. Zhang ◽  
Y. Li ◽  
X. Wei

This paper proposes an improved watermarking algorithm based on DCT(Discrete Cosine Transform). We carried out the algorithm as described as follows. First, we extended both rows and ranks of the watermark by using the proposed method before the embedding stage. After expansion, Sine chaotic system is employed in encrypting the watermark. In the embedding stage, an effective and adaptive embedding method is proposed to embed the watermark into the blocked DCT coefficients. Experimental results demonstrate that the proposed algorithm in this paper works well in resisting both geometry attack and noise attack. It also does well in recovering the watermark after stego image suffered from JPEG compression.


Semi-blind Image Steganography algorithm development proposed by using DC coefficients of DCT technique. Create KEY vector and potential block matrix while embedding the secret data. Embed one secret character in one DCT block using the DC value of each block. Convert DC coefficient to binary representation and store positions for secret data. Apply JPEG compression on Stego Image. While extracting the secret data from compressed Stego Image, with the use of a KEY vector extracts secret data bits from potential blocks. After creating simulation, perform some test on a standard dataset and compare the results with target results


Author(s):  
Marc J. Stern

Social science theory for environmental sustainability: A practical guide makes social science theory accessible and usable to anyone interested in working toward environmental sustainability at any scale. Environmental problems are, first and foremost, people problems. Without better understandings of the people involved, solutions are often hard to come by. This book answers calls for demonstrating the value of theories from the social sciences for solving these types of problems and provides strategies to facilitate their use. It contains concise summaries of over thirty social science theories and demonstrates how to use them in diverse contexts associated with environmental conflict, conservation, natural resource management, and other environmental sustainability challenges. The practical applications of the theories include persuasive communication, conflict resolution, collaboration, negotiation, enhancing organizational effectiveness, working across cultures, generating collective impact, and building more resilient governance of social-ecological systems. Examples throughout the book and detailed vignettes illustrate how to combine multiple social science theories to develop effective strategies for environmental problem solving. The final chapter draws out key principles for enhancing these efforts. The book will serve as a key reference for environmental professionals, business people, students, scientists, public officials, government employees, aid workers, or any concerned citizen who wants to be better equipped to navigate the social complexities of environmental challenges and make a meaningful impact on any environmental issue.


2020 ◽  
Vol 68 (5) ◽  
pp. 999-1014
Author(s):  
Amín Pérez

This article proposes a new understanding of the constraints and opportunities that lead intellectuals engaged in different political and social fields to create alternative modes of resistance to domination. The study of the Algerian sociologist Abdelmalek Sayad offers insights into the social conditions of this mode of committed scholarship. On the one hand, this article applies Sayad’s theory of immigration to his transnational intellectual engagements. It establishes how immigrants’ intellectual work are conditioned by their trajectories, both before and after leaving their country, and by the stages of emigration (from playing a role in the society of origin to becoming caught up in the reality of the host society). On the other hand, the article illuminates the constraints and the spaces of possible action intellectuals face while moving across national universes and disparate political and academic fields. Sayad’s marginal position within the academy constrained him to work for the French and Algerian governments and international organizations while he was simultaneously engaged with political dissidents, unionists, writers, and social movements. In tracking Sayad’s roles as an academic, expert and public sociologist, the article uncovers the conditions that grounded improbable alliances between those fields and produced new forms of critique and political action. The article concludes by drawing out some reflections that ‘collective intellectual’ engagements elicit to the sociology of intellectuals.


2007 ◽  
Vol 40 (3) ◽  
pp. 307-322 ◽  
Author(s):  
Haim Weinberg

Although the concept of the Social Unconscious has increased in importance in the group analytic literature recently, there are still many misconceptions and misunderstandings about it and its practical applications. While some papers define the term, there are no papers explaining the basics of the social unconscious and what it includes. The purpose of this article is to address the misconceptions, describe the basic building blocks of the social unconscious, and develop a working definition for this complex term.


2017 ◽  
Vol 24 (3) ◽  
pp. 528-544 ◽  
Author(s):  
Ioannis Giotopoulos ◽  
Alexandra Kontolaimou ◽  
Aggelos Tsakanikas

Purpose The purpose of this paper is to explore potential drivers of high-growth intentions of early-stage entrepreneurs in Greece before and after the onset of the financial crisis of 2008. Design/methodology/approach To this end, the authors use individual-level data retrieved from Global Entrepreneurship Monitor annual surveys (2003-2015). Findings The results show that high-growth intentions of Greek entrepreneurs are driven by different factors in the crisis compared to the non-crisis period. Male entrepreneurs and entrepreneurs with significant work experience seem to be more likely to be engaged in growth-oriented new ventures during the crisis period. The same appears to hold for entrepreneurs who are motivated by an opportunity and also perceive future business opportunities in adverse economic conditions. On the other hand, the educational level and the social contacts of founders with other entrepreneurs are found to drive ambitious Greek entrepreneurship in the years before the crisis, while they were insignificant after the crisis outbreak. Originality/value Based on the concept of ambitious entrepreneurship, this study contributes to the literature by investigating the determinants of entrepreneurial high-growth expectations in the Greek context emphasizing the crisis period in comparison to the pre-crisis years.


2021 ◽  
Vol 14 (7) ◽  
pp. 1124-1136
Author(s):  
Dimitris Tsaras ◽  
George Trimponias ◽  
Lefteris Ntaflos ◽  
Dimitris Papadias

Influence maximization (IM) is a fundamental task in social network analysis. Typically, IM aims at selecting a set of seeds for the network that influences the maximum number of individuals. Motivated by practical applications, in this paper we focus on an IM variant, where the owner of multiple competing products wishes to select seeds for each product so that the collective influence across all products is maximized. To capture the competing diffusion processes, we introduce an Awareness-to-Influence (AtI) model. In the first phase, awareness about each product propagates in the social graph unhindered by other competing products. In the second phase, a user adopts the most preferred product among those encountered in the awareness phase. To compute the seed sets, we propose GCW, a game-theoretic framework that views the various products as agents, which compete for influence in the social graph and selfishly select their individual strategy. We show that AtI exhibits monotonicity and submodularity; importantly, GCW is a monotone utility game. This allows us to develop an efficient best-response algorithm, with quality guarantees on the collective utility. Our experimental results suggest that our methods are effective, efficient, and scale well to large social networks.


PEDIATRICS ◽  
1969 ◽  
Vol 44 (5) ◽  
pp. 838-847
Author(s):  
John H. Read

The two papers that follow report the results of painstaking epidemiological work on pedestrian accidents involving children. Because these papers relate the age of the child to specific behavior patterns that result in accidents and to specific injury patterns that result from such accidents, they would appear to offer a sound empirical base for the development of a variety of countermeasures, whether such countermeasures are intended to reduce accidents or to limit the severity of the resulting injuries. Unfortunately, however, the ability to generalize such data is extremely limited. A given pattern of child-pedestrian behavior is the result of a highly complex set of variables: the social class and ethnicity of the child, the ecological characteristics of the neighborhood and the broader community, the characteristics of the traffic pattern and the types and density of the vehicles that make it up, the current enforcement policy, climatic conditions, road and highway characteristics, and a host of other conditions that combine and interact in various ways. Consequently, few localities are sufficiently similar to justify the application of data from one to another. The injury patterns described by Ryan, for example, are those produced by Australian vehicles on children walking, playing, and cycling in a specific Australian city. It seems quite unlikely that the injury patterns produced in an American urban environment would resemble those that Ryan reports. Indeed, data from another Australian city might show striking differences. For the same reasons, such data as Read presents cannot be used reliably as a before-and-after measure to assess the effectiveness of a specific countermeasure. Any significant changes in the data after the introduction of a countermeasure might well be attributable not to the countermeasure itself but to changes in traffic patterns, ecology, the weather, or other events which operated to reinforce or counteract the countermeasure in question. The overwhelming obstacle to systematic research in vehicular accidents and on the assessment of countermeasure effectiveness is the investigator's inability to control the numerous variables that affect both the incidence and the consequences of accidents. The present papers, despite their inherently interesting data, are seriously limited by this problem.


Sign in / Sign up

Export Citation Format

Share Document