Study on Universal Steganalysis for BMP Images Based on Multi-Domain Features

2013 ◽  
Vol 278-280 ◽  
pp. 1906-1909 ◽  
Author(s):  
Yan Yan ◽  
Li Ting Li ◽  
Jian Bin Xue ◽  
Hong Guo Liu ◽  
Qiu Yu Zhang

Steganslysis is an important research issue in information security. Aimed at the most commonly used cover media, digital images, the paper proposed a new method of universal steganalysis method based on multi-domain features. Features were extracted from spatial domain and DWT domain to overcome the drawbacks of steganslysis algorithm for specific steganography, such as high complexity and low correct detecting ratio. Experiment results show that the proposed algorithm can solve the low detecting problem and achieve a better reliability on low embedding rates.

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang

AbstractThe mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness level of TP must be honest. To the best of our knowledge, none of the existing MSQKD protocols can resolve both these issues. Therefore, this study takes Bell states as the quantum resource to propose a MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest. Furthermore, the proposed protocol is shown to be secure against well-known attacks and the classical participants only need two quantum capabilities. Therefore, in comparison to the existing MSQKD protocols, the proposed protocol is better practical.


2018 ◽  
Vol 7 (2.19) ◽  
pp. 61
Author(s):  
D Femi ◽  
G Veera Babu ◽  
B V Sumanth Kumar Reddy

As the use of digital images has expanded, so has the methods and the motivating force to make advanced picture frauds. As needs be, there is an incredible requirement for advanced image legal sciences methods equipped for identifying image changes and manufactured images. We demonstrate that pixel value mappings desert factual follows which we might allude to as a mappings inherent unique finger impression in an image pixel value histogram. We at that point propose scientific techniques for recognizing general structures all around and privately connected complexity upgrade and in addition a strategy for distinguishing the utilization of histogram leveling via hunting down the recognizing highlights of every task intrinsic fingerprint. Also we propose a technique to identify the worldwide expansion of noise to a formerly JPEG - compacted image by watching that the key fingerprint of a particular planning will be adjusted on the off chance that it is connected to a image’s pixel value after the noise addition.  


Author(s):  
Puspalata Sah ◽  
Kandarpa Kumar Sarma

Detection of diabetes using bloodless technique is an important research issue in the area of machine learning and artificial intelligence (AI). Here we present the working of a system designed to detect the abnormality of the eye with pain and blood free method. The typical features for diabetic retinopathy (DR) are used along with certain soft computing techniques to design such a system. The essential components of DR are blood vessels, red lesions visible as microaneurysms, hemorrhages and whitish lesions i.e., lipid exudates and cotton wool spots. The chapter reports the use of a unique feature set derived from the retinal image of the eye. The feature set is applied to a Support Vector Machine (SVM) which provides the decision regarding the state of infection of the eye. The classification ability of the proposed system for blood vessel and exudate is 91.67% and for optic disc and microaneurysm is 83.33%.


Author(s):  
Wayne W. Huang ◽  
Kwok-Kee Wei ◽  
John Lim

This chapter deals with the use of a group support system (GSS) to support virtual team-building. Literature review on Group Support Systems (GSS) indicates that most prior GSS research focuses on supporting face-to-face teamwork, and few studies were conducted in supporting virtual teamwork and team-building. When virtual teamwork becomes more common in modern organizations, how GSS can be used to enhance virtual team-building is becoming an important research issue. This chapter proposes a conceptual team-building framework. By embedding this conceptual framework into a GSS, the GSS may have the potential to support virtual team-building. Based on the framework, a set of testable research propositions is formulated, and some suggestions for future GSS research are discussed.


2011 ◽  
Vol 19 (2) ◽  
Author(s):  
A. Roy ◽  
S. Mitra ◽  
R. Agrawal

AbstractManipulation in image has been in practice since centuries. These manipulated images are intended to alter facts — facts of ethics, morality, politics, sex, celebrity or chaos. Image forensic science is used to detect these manipulations in a digital image. There are several standard ways to analyze an image for manipulation. Each one has some limitation. Also very rarely any method tried to capitalize on the way image was taken by the camera. We propose a new method that is based on light and its shade as light and shade are the fundamental input resources that may carry all the information of the image. The proposed method measures the direction of light source and uses the light based technique for identification of any intentional partial manipulation in the said digital image. The method is tested for known manipulated images to correctly identify the light sources. The light source of an image is measured in terms of angle. The experimental results show the robustness of the methodology.


2000 ◽  
Vol 39 (01) ◽  
pp. 16-21 ◽  
Author(s):  
A. Abu-Hanna ◽  
J. H. M. Zwetsloot-Schonk ◽  
N. F. de Keizer

Abstract:Terminological systems are an important research issue within the field of medical informatics. For precise understanding of existing terminological systems a referential framework is needed that provides a uniform terminology and typology of terminological systems themselves. In this article a uniform terminology is described by putting relevant fundamental notions and definitions used by standard organizations such as CEN and ISO into perspective, and interrelating them to arrive at a useful typology of terminological systems. This typology is illustrated by applying it to five well-known existing terminological systems.


Sign in / Sign up

Export Citation Format

Share Document