huffman coding
Recently Published Documents


TOTAL DOCUMENTS

443
(FIVE YEARS 98)

H-INDEX

22
(FIVE YEARS 3)

Author(s):  
Noor Alhuda F. Abbas ◽  
Nida Abdulredha ◽  
Raed Khalid Ibrahim ◽  
Adnan Hussein Ali

Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.


Author(s):  
Huda Kadhim Tayyeh ◽  
Ahmed Sabah Ahmed AL-Jumaili

Steganography is one of the cryptography techniques where secret information can be hidden through multimedia files such as images and videos. Steganography can offer a way of exchanging secret and encrypted information in an untypical mechanism where communicating parties can only interpret the secret message. The literature has shown a great interest in the least significant bit (LSB) technique which aims at embedding the secret message bits into the most insignificant bits of the image pixels. Although LSB showed a stable performance of image steganography yet, many works should be done on the message part. This paper aims to propose a combination of LSB and Deflate compression algorithm for image steganography. The proposed Deflate algorithm utilized both LZ77 and Huffman coding. After compressing the message text, LSB has been applied to embed the text within the cover image. Using benchmark images, the proposed method demonstrated an outperformance over the state of the art. This can proof the efficacy of using Deflate as a data compression prior to the LSB embedding.


2021 ◽  
Author(s):  
Xin Wei ◽  
Kun Chen ◽  
Yang Liu ◽  
Xuefei Zhao ◽  
Li Ma ◽  
...  
Keyword(s):  

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Harsimranjit Singh Gill ◽  
Tarandip Singh ◽  
Baldeep Kaur ◽  
Gurjot Singh Gaba ◽  
Mehedi Masud ◽  
...  

Media streaming falls into the category of Big Data. Regardless of the video duration, an enormous amount of information is encoded in accordance with standardized algorithms of videos. In the transmission of videos, the intended recipient is allowed to receive a copy of the broadcasted video; however, the adversary also has access to it which poses a serious concern to the data confidentiality and availability. In this paper, a cryptographic algorithm, Advanced Encryption Standard, is used to conceal the information from malicious intruders. However, in order to utilize fewer system resources, video information is compressed before its encryption. Various compression algorithms such as Discrete Cosine Transform, Integer Wavelet transforms, and Huffman coding are employed to reduce the enormous size of videos. moving picture expert group is a standard employed in video broadcasting, and it constitutes of different frame types, viz., I, B, and P frames. Later, two frame types carry similar information as of foremost type. Even I frame is to be processed and compressed with the abovementioned schemes to discard any redundant information from it. However, I frame embraces an abundance of new information; thus, encryption of this frame is sufficient enough to safeguard the whole video. The introduction of various compression algorithms can further increase the encryption time of one frame. The performance parameters such as PSNR and compression ratio are examined to further analyze the proposed model’s effectiveness. Therefore, the presented approach has superiority over the other schemes when the speed of encryption and processing of data are taken into consideration. After the reversal of the complete system, we have observed no major impact on the quality of the deciphered video. Simulation results ensure that the presented architecture is an efficient method for enciphering the video information.


2021 ◽  
Vol 30 (05) ◽  
Author(s):  
Rohan Kishor Netalkar ◽  
Hillol Barman ◽  
Rushik Subba ◽  
Kandula Venkata Preetam ◽  
Undi Surya Narayana Raju

2021 ◽  
Author(s):  
A.H.M. Zadidul Karim ◽  
Md. Sazal Miah ◽  
Md Abdullah Al Mahmud ◽  
Muhammad Towhidur Rahman

Sign in / Sign up

Export Citation Format

Share Document